First published: Wed Mar 06 2019(Updated: )
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 3500 Platform Switches and Nexus 3000 Series Switches software versions prior to 7.0(3)I7(4) are affected.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | >=7.0\(3\)<=7.0\(3\)i7\(4\) | |
Cisco Nexus 3500 Platform | ||
Cisco Nx-os | <7.0\(3\)i7\(4\) | |
Cisco Nexus 3000 Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1610 is a vulnerability in the CLI of Cisco NX-OS Software that could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device.
CVE-2019-1610 allows an authenticated, local attacker to execute arbitrary commands on the affected device's operating system.
CVE-2019-1610 has a severity score of 6.7, which is considered high.
An attacker can exploit CVE-2019-1610 by passing malicious arguments to certain CLI commands in Cisco NX-OS Software.
Yes, you can find more information about CVE-2019-1610 at the following references: - http://www.securityfocus.com/bid/107338 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1610