First published: Mon May 22 2017(Updated: )
A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | =7.1\(1\)n1\(1\) | |
Cisco Nx-os | =7.1\(2\)n1\(1\) | |
Cisco Nx-os | =7.1\(3\)n1\(1\) | |
Cisco Nx-os | =7.1\(3\)n1\(2\) | |
Cisco Nx-os | =7.1\(3\)n1\(2.1\) | |
Cisco Nx-os | =7.1\(3\)n1\(3.12\) | |
Cisco Nx-os | =7.1\(4\)n1\(1\) | |
Cisco Nx-os | =7.2\(0\)d1\(0.437\) | |
Cisco Nx-os | =7.2\(0\)n1\(1\) | |
Cisco Nx-os | =7.2\(0\)zz\(99.1\) | |
Cisco Nx-os | =7.2\(1\)n1\(1\) | |
Cisco Nx-os | =7.3\(0\)n1\(1\) | |
Cisco Nexus 5548up | ||
Cisco Nexus 5596t | ||
Cisco Nexus 5596up | ||
Cisco Nexus 56128p | ||
Cisco Nexus 5624q | ||
Cisco Nexus 5648q | ||
Cisco Nexus 5672up | ||
Cisco Nexus 5672up-16g | ||
Cisco Nexus 5696q |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.