First published: Wed May 15 2019(Updated: )
A vulnerability in the Secure Configuration Validation functionality of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to run arbitrary commands at system boot time with the privileges of root. The vulnerability is due to a lack of proper validation of system files when the persistent configuration information is read from the file system. An attacker could exploit this vulnerability by authenticating to the device and overwriting the persistent configuration storage with malicious executable files. An exploit could allow the attacker to run arbitrary commands at system startup and those commands will run as the root user. The attacker must have valid administrative credentials for the device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | >=8.1<8.1\(1b\) | |
Cisco NX-OS | >=8.2<8.3\(1\) | |
Cisco MDS 9000 Series Multilayer Switches | ||
Cisco MDS 9100 | ||
Cisco MDS 9200 | ||
Cisco MDS 9500 | ||
Cisco MDS 9700 | ||
Cisco NX-OS | >=7.0\(3\)i7<7.0\(3\)i7\(3\) | |
Cisco Nexus 3000 | ||
Cisco Nexus 3100 Firmware | ||
Cisco Nexus 3100-Z firmware | ||
Cisco Nexus 3100V Firmware | ||
Cisco Nexus 3200 | ||
Cisco Nexus 3400 Firmware | ||
Cisco Nexus 3500 Platform | ||
Cisco Nexus 3600 Firmware | ||
Cisco Nexus 9000 Firmware | ||
Cisco Nexus 9200 firmware | ||
Cisco Nexus 9300 Firmware | ||
Cisco Nexus 9500 Series | ||
Cisco NX-OS | >=6.0\(2\)a8<6.0\(2\)a8\(11\) | |
Cisco NX-OS | >=7.0\(3\)<7.0\(3\)i7\(3\) | |
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-XL Firmware | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3548-X/XL | ||
Cisco NX-OS | >=7.3<7.3\(4\)n1\(1\) | |
Cisco NX-OS for Nexus 5500 Platform Switches | ||
Cisco Nexus 5600 Firmware | ||
Cisco Nexus 6000 firmware | ||
Cisco NX-OS | >=6.2<6.2\(22\) | |
Cisco NX-OS | >=7.2<7.3\(3\)d1\(1\) | |
Cisco NX-OS | >=8.0<8.3\(1\) | |
Cisco Nexus 7000 | ||
Cisco Nexus 7700 series | ||
Cisco NX-OS | >=4.0<4.0\(1a\) | |
Cisco UCS 6248UP | ||
Cisco UCS 6296UP | ||
Cisco UCS 6332 | ||
Cisco UCS 6324 | ||
Cisco UCS 6332-16UP Fabric Interconnect | ||
Cisco NX-OS | >=2.4<2.4.1.101 | |
Cisco Firepower 4110 Next-Generation Firewall | ||
Cisco Firepower 4115 | ||
Cisco Firepower 4120 Next-Generation Firewall | ||
Cisco Firepower 4125 firmware | ||
Cisco Firepower 4140 Next-Generation Firewall | ||
Cisco Firepower 4145 firmware | ||
Cisco Firepower 4150 Next-Generation Firewall | ||
Cisco Firepower 9300 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1728 is a vulnerability in the Secure Configuration Validation functionality of Cisco FXOS Software and Cisco NX-OS Software.
The severity of CVE-2019-1728 is high with a CVSS score of 6.7.
CVE-2019-1728 affects Cisco NX-OS software versions 6.0(2)a8 to 8.1(1b) and versions 8.2 to 8.3(1).
No, Cisco MDS 9000 is not affected by CVE-2019-1728.
To fix CVE-2019-1728, Cisco recommends upgrading to a fixed software release.