First published: Wed Mar 06 2019(Updated: )
A vulnerability in the Cisco Nexus 9000 Series Fabric Switches running in Application-Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to read arbitrary files on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms of user-supplied input sent to an affected device. A successful exploit could allow the attacker unauthorized access to read arbitrary files on an affected device. This vulnerability has been fixed in version 14.0(1h).
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | <14.0\(1h\) | |
Cisco Nexus 9000 Firmware | ||
All of | ||
Cisco NX-OS | <14.0\(1h\) | |
Cisco Nexus 9000 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1588 is a vulnerability in the Cisco Nexus 9000 Series Fabric Switches that allows an authenticated, local attacker to read arbitrary files on the device.
CVE-2019-1588 has a severity value of 4.4, which is considered medium.
CVE-2019-1588 affects Cisco Nexus 9000 switches running in ACI mode by allowing an authenticated, local attacker to read arbitrary files on the affected device.
To fix CVE-2019-1588, it is recommended to apply the necessary updates or patches provided by Cisco.
Yes, Cisco is aware of CVE-2019-1588 and has released a security advisory regarding this vulnerability.