First published: Wed Mar 06 2019(Updated: )
A vulnerability in the controller authorization functionality of Cisco Nexus 9000 Series ACI Mode Switch Software could allow an authenticated, local attacker to escalate standard users with root privilege on an affected device. The vulnerability is due to a misconfiguration of certain sudoers files for the bashroot component on an affected device. An attacker could exploit this vulnerability by authenticating to the affected device with a crafted user ID, which may allow temporary administrative access to escalate privileges. A successful exploit could allow the attacker to escalate privileges on an affected device. This Vulnerability has been fixed in version 4.0(1h)
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | =8.3\(0\)sk\(0.39\) | |
Cisco Nexus 92160yc-x | ||
Cisco Nexus 92304qc | ||
Cisco Nexus 9236c | ||
Cisco Nexus 9272q | ||
Cisco Nexus 93108tc-ex | ||
Cisco Nexus 93120tx | ||
Cisco Nexus 93128tx | ||
Cisco Nexus 93180yc-ex | ||
Cisco Nexus 9332pq | ||
Cisco Nexus 9336pq Aci Spine | ||
Cisco Nexus 9372px | ||
Cisco Nexus 9372tx | ||
Cisco Nexus 9396px | ||
Cisco Nexus 9396tx | ||
Cisco Nexus 9500 | ||
Cisco Nexus 9504 | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 | ||
Cisco Application Policy Infrastructure Controller Software | <=4.0\(1h\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1585.
Cisco Nexus 9000 Series ACI Mode Switch Software version 8.3(0)sk(0.39) is affected.
CVE-2019-1585 has a severity rating of 7.8 (high).
An attacker can exploit CVE-2019-1585 by escalating standard users with root privilege on an affected device.
Yes, you can find more information about CVE-2019-1585 at the following references: - [SecurityFocus](http://www.securityfocus.com/bid/107312) - [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-controller-privsec)