First published: Fri Jul 03 2015(Updated: )
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =6.2\(10\) | |
Cisco MDS 9100 | ||
Cisco MDS 9200 | ||
Cisco MDS 9500 | ||
Cisco MDS 9700 | ||
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128 Firmware | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus N9336PQ-X | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372TX | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-4232 is classified as high due to the ability for local users to execute arbitrary OS commands.
To fix CVE-2015-4232, upgrade Cisco NX-OS to a version that is not vulnerable, specifically to a version beyond 6.2(10).
CVE-2015-4232 affects Cisco NX-OS 6.2(10) specifically on Nexus and MDS 9000 devices.
CVE-2015-4232 is not remotely exploitable as it requires local access for exploitation.
CVE-2015-4232 allows local users to execute arbitrary OS commands, potentially compromising the device's integrity.