CVE-2019-1591
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Shell Escape Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in a specific CLI command implementation of Cisco Nexus 9000 Series ACI Mode Switch Software could allow an authenticated, local attacker to escape a restricted shell on an affected device. The vulnerability is due to insufficient sanitization of user-supplied input when issuing a specific CLI command with parameters on an affected device. An attacker could exploit this vulnerability by authenticating to the device CLI and issuing certain commands. A successful exploit could allow the attacker to escape the restricted shell and execute arbitrary commands with root-level privileges on the affected device. This vulnerability only affects Cisco Nexus 9000 Series ACI Mode Switches that are running a release prior to 14.0(3d).
Una vulnerabilidad en la implementación de un comando de la interfaz de la línea de comandos (CLI) específico de Cisco Nexus 9000 Series ACI Mode Switch Software podría permitir a un atacante local autenticado escapar de un shell restringido en un dispositivo afectado. Esta vulnerabilidad se debe a un saneamiento insuficiente de entradas proporcionadas por el usuario al enviar un comando de CLI específico con parámetros en un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad autenticándose en el CLI del dispositivo y enviando determinados comandos. Un exploit con éxito podría permitir que el atacante escape del shell restringido y ejecute comandos arbitrarios con privilegios root en el dispositivo afectado. Esta vulnerabilidad solo afecta a Cisco Nexus 9000 Series ACI Mode Switches que estén ejecutando una distribución anterior a la 14.0(3d).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-06 CVE Reserved
- 2019-03-06 CVE Published
- 2023-03-08 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/107311 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-shell-escape | 2020-10-08 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | < 14.0\(3d\) Search vendor "Cisco" for product "Nx-os" and version " < 14.0\(3d\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 9000 Search vendor "Cisco" for product "Nexus 9000" | - | - |
Safe
|