First published: Thu Nov 30 2017(Updated: )
A vulnerability in the guest shell feature of Cisco NX-OS System Software could allow an authenticated, local attacker to read and send packets outside the scope of the guest shell container. An attacker would need valid administrator credentials to perform this attack. The vulnerability is due to insufficient internal security measures in the guest shell feature. An attacker could exploit this vulnerability by sending or receiving packets on the device-internal network outside of the guest shell container, aka "Unauthorized Internal Interface Access." This vulnerability affects the following products running Cisco NX-OS System Software: Nexus 3000 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvf33038.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =7.0\(3\)i7\(1\) | |
Cisco NX-OS | =8.1\(0\)bd\(0.20\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12351 is classified as high due to its potential for unauthorized data access.
To fix CVE-2017-12351, you should upgrade to a fixed version of Cisco NX-OS that addresses this vulnerability.
CVE-2017-12351 affects systems running specific versions of Cisco NX-OS, including 7.0(3)i7(1) and 8.1(0)bd(0.20).
No, an attacker must have valid administrator credentials to exploit CVE-2017-12351.
If exploited, CVE-2017-12351 allows an attacker to read and send packets outside the guest shell container.