First published: Wed Jun 20 2018(Updated: )
A vulnerability in the write-erase feature of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to configure an unauthorized administrator account for an affected device. The vulnerability exists because the affected software does not properly delete sensitive files when certain CLI commands are used to clear the device configuration and reload a device. An attacker could exploit this vulnerability by logging into an affected device as an administrative user and configuring an unauthorized account for the device. The account would not require a password for authentication and would be accessible only via a Secure Shell (SSH) connection to the device. A successful exploit could allow the attacker to configure an unauthorized account that has administrative privileges, does not require a password for authentication, and does not appear in the running configuration or the audit logs for the affected device. This vulnerability affects Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Fabric Extenders, Nexus 3500 Platform Switches, Nexus 4000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvd13993, CSCvd34845, CSCvd34857, CSCvd34862, CSCvd34879, CSCve35753.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =7.3\(2\)n1\(0.354\) | |
Cisco Nexus 5000 firmware | ||
Cisco Nexus 5010 | ||
Cisco Nexus 5020 | ||
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco 56128p | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648Q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5696Q Firmware | ||
Cisco NX-OS | =5.2\(1\)sv3\(1.10\) | |
Cisco Nexus 1000V | ||
Cisco NX-OS | =8.8\(3.5\)s0 | |
Cisco Nexus 92160YC Switch | ||
Cisco Nexus 92304QC Switch | ||
Cisco Nexus 9236C Switch | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus | ||
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128 Firmware | ||
Cisco Nexus 93180YC-EX-24 | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372TX | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware | ||
Cisco Nexus 9508 | ||
Cisco x9636q-r | ||
Cisco Nexus X9636Q-R | ||
Cisco NX-OS | =7.0\(3\)i2\(4a\) | |
Cisco Nexus 172tq-xl | ||
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064x | ||
Cisco Nexus 3100V Firmware | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132C-Z Firmware | ||
Cisco Nexus 3132Q-XL | ||
Cisco Nexus 3132Q-X/3132Q-XL | ||
Cisco Nexus 3132Q-XL Firmware | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172PQ/PQ-XL | ||
Cisco Nexus 3172PQ-XL Firmware | ||
Cisco Nexus 3172TQ Firmware | ||
Cisco Nexus 3172TQ-XL | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264C-E Firmware | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 34180YC Firmware | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-XL Firmware | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3636C-R Firmware | ||
Cisco Nexus 36180YC-R | ||
Cisco UCS 6120xp | ||
Cisco UCS 6140xp | ||
Cisco UCS 6248UP | ||
Cisco UCS 6296UP | ||
Cisco UCS 6324 firmware | ||
Cisco UCS 6332 | ||
Cisco Firepower Extensible Operating System | >=2.1.1<2.1.1.86 | |
Cisco Firepower Extensible Operating System | >=2.2<2.2.2.17 | |
Cisco FX-OS | >=1.1<2.0.1.159 | |
Cisco Firepower 4110 Next-Generation Firewall | ||
Cisco Firepower 4120 Next-Generation Firewall | ||
Cisco Firepower 4140 Next-Generation Firewall | ||
Cisco Firepower 4150 Next-Generation Firewall | ||
Cisco Firepower 9300 Security Appliances | ||
Cisco NX-OS | =4.1\(2\)e1\(1a\) | |
Cisco Nexus 4001 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0294 is considered critical as it could allow an authenticated, local attacker to create unauthorized administrator accounts on affected devices.
To fix CVE-2018-0294, users should update their Cisco FXOS or NX-OS Software to a patched version provided in the security advisory.
CVE-2018-0294 affects specific versions of Cisco FXOS and Cisco NX-OS Software, particularly including certain iterations of NX-OS 7.3 and NX-OS 5.2.
CVE-2018-0294 is not considered remotely exploitable as it requires local authenticated access to configure unauthorized accounts.
CVE-2018-0294 can facilitate unauthorized administrative access, potentially leading to a complete compromise of device management controls.