First published: Mon May 22 2017(Updated: )
A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =7.1\(1\)n1\(1\) | |
Cisco NX-OS | =7.1\(2\)n1\(1\) | |
Cisco NX-OS | =7.1\(3\)n1\(1\) | |
Cisco NX-OS | =7.1\(3\)n1\(2\) | |
Cisco NX-OS | =7.1\(3\)n1\(2.1\) | |
Cisco NX-OS | =7.1\(3\)n1\(3.12\) | |
Cisco NX-OS | =7.1\(4\)n1\(1\) | |
Cisco NX-OS | =7.2\(0\)d1\(0.437\) | |
Cisco NX-OS | =7.2\(0\)n1\(1\) | |
Cisco NX-OS | =7.2\(0\)zz\(99.1\) | |
Cisco NX-OS | =7.2\(1\)n1\(1\) | |
Cisco NX-OS | =7.3\(0\)n1\(1\) | |
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco 56128p | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648Q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5672UP-16G Firmware | ||
Cisco Nexus 5696Q Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6649 has a high severity rating due to the potential for command injection attacks on affected Cisco NX-OS versions.
To address CVE-2017-6649, upgrading to a fixed version of NX-OS that addresses the vulnerability is recommended.
CVE-2017-6649 affects Cisco NX-OS versions 7.1 through 7.3.
No, CVE-2017-6649 requires an authenticated, local attacker to exploit the vulnerability.
CVE-2017-6649 impacts Cisco Nexus Series Switches running vulnerable NX-OS versions.