First published: Wed Mar 06 2019(Updated: )
A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level by executing commands authorized to other user roles. The attacker must authenticate with valid user credentials. The vulnerability is due to the incorrect implementation of a Bash shell command that allows role-based access control (RBAC) to be bypassed. An attacker could exploit this vulnerability by authenticating to the device and entering a crafted command at the Bash prompt. A successful exploit could allow the attacker to escalate their privilege level by executing commands that should be restricted to other roles. For example, a dev-ops user could escalate their privilege level to admin with a successful exploit of this vulnerability.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | >=7.0\(3\)i5<7.0\(3\)i7\(4\) | |
Cisco Nexus 3000 | ||
Cisco Nx-os | >=7.0\(3\)i4<7.0\(3\)i4\(9\) | |
Cisco Nx-os | >=7.0\(3\)<7.0\(3\)i7\(4\) | |
Cisco Nexus 3500 | ||
Cisco Nx-os | >=7.0\(3\)<7.0\(3\)f3\(5\) | |
Cisco Nexus 3600 | ||
Cisco Nx-os | >=8.1<8.2\(3\) | |
Cisco Nx-os | >=8.3<8.3\(1\) | |
Cisco Nexus 7000 | ||
Cisco Nexus 7700 | ||
Cisco Nx-os | <13.2\(4d\) | |
Cisco Nx-os | >=14.0<14.0\(1h\) | |
Cisco Nexus 9000 In Aci Mode | ||
Cisco Nexus 9000 In Standalone | ||
Cisco Nexus 9500 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)i5<7.0\(3\)i7\(4\) | |
Cisco Nexus 3000 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)i4<7.0\(3\)i4\(9\) | |
Cisco Nexus 3000 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)<7.0\(3\)i7\(4\) | |
Cisco Nexus 3500 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)<7.0\(3\)f3\(5\) | |
Cisco Nexus 3600 | ||
All of | ||
Any of | ||
Cisco Nx-os | >=8.1<8.2\(3\) | |
Cisco Nx-os | >=8.3<8.3\(1\) | |
Any of | ||
Cisco Nexus 7000 | ||
Cisco Nexus 7700 | ||
All of | ||
Any of | ||
Cisco Nx-os | <13.2\(4d\) | |
Cisco Nx-os | >=14.0<14.0\(1h\) | |
Cisco Nexus 9000 In Aci Mode | ||
All of | ||
Any of | ||
Cisco Nx-os | >=7.0\(3\)i4<7.0\(3\)i4\(9\) | |
Cisco Nx-os | >=7.0\(3\)i5<7.0\(3\)i7\(4\) | |
Cisco Nexus 9000 In Standalone | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)<7.0\(3\)f3\(5\) | |
Cisco Nexus 9500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1593 is a vulnerability in the Bash shell implementation for Cisco NX-OS Software that allows an authenticated, local attacker to escalate their privilege level.
CVE-2019-1593 affects Cisco NX-OS Software versions 7.0(3)i5 to 7.0(3)i7(4) and versions 7.0(3)i4 to 7.0(3)i4(9).
The severity of CVE-2019-1593 is high, with a severity value of 7.8.
To fix CVE-2019-1593, Cisco recommends upgrading Cisco NX-OS Software to a fixed version.
You can find more information about CVE-2019-1593 on the SecurityFocus website and the Cisco Security Advisory.