First published: Thu Oct 27 2011(Updated: )
Cisco Nexus OS (aka NX-OS) 4.2 and 5.0 and Cisco Unified Computing System with software 1.4 and 2.0 do not properly restrict command-line options, which allows local users to gain privileges via unspecified vectors, aka Bug IDs CSCtf40008, CSCtg18363, CSCtr44645, CSCts10195, and CSCts10188.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =5.0 | |
Cisco NX-OS | =4.2 | |
Cisco Unified Computing System software | ||
Cisco Unified Computing System | =1.4\(1j\) | |
Cisco Unified Computing System | =2.0\(1q\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2569 is classified with a medium severity due to its potential for privilege escalation by local users.
To fix CVE-2011-2569, update Cisco NX-OS to version 5.0 or later, or Cisco Unified Computing System software to version 2.0(1q) or later.
Organizations using Cisco NX-OS versions 4.2 and 5.0 or Cisco Unified Computing System software versions 1.4 and 2.0 are affected.
The impact of CVE-2011-2569 allows local users to gain higher privileges, which can lead to unauthorized access and potential manipulation of system settings.
CVE-2011-2569 was disclosed in 2011, highlighting vulnerabilities in Cisco networking software.