First published: Wed May 15 2019(Updated: )
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with the privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | <7.0\(3\)i4\(9\) | |
Cisco NX-OS | >=7.0\(3\)i7<7.0\(3\)i7\(4\) | |
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 Firmware | ||
Cisco Nexus 3064 | ||
Cisco Nexus 31108PC-V Firmware | ||
Cisco Nexus 31108TC-V Firmware | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132C-Z Firmware | ||
Cisco Nexus 3132Q-XL | ||
Cisco Nexus 3132Q-V Firmware | ||
Cisco Nexus 3132Q-XL Firmware | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172 Firmware | ||
Cisco Nexus 3172PQ-XL Firmware | ||
Cisco Nexus 3172TQ Firmware | ||
Cisco Nexus 3172TQ-XL | ||
Cisco Nexus 3172TQ-XL Firmware | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264C-E Firmware | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 34180YC Firmware | ||
Cisco Nexus 3464C Firmware | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-x/xl | ||
Cisco Nexus 3524-X/XL | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3548-x/xl | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 36180YC-R Firmware | ||
Cisco Nexus 3636C-R Firmware | ||
Cisco Nexus 9200 | ||
Cisco Nexus 92304QC Firmware | ||
Cisco Nexus 9236C | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus | ||
Cisco Nexus 93108TC-FX Switch | ||
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128TX | ||
Cisco Nexus 9000 Series Switch | ||
Cisco Nexus 93180YC-EX-24 | ||
Cisco Nexus 93180YC-FX Firmware | ||
Cisco Nexus 93240TC-FX2 | ||
Cisco Nexus 9332C Firmware | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus 9336PQ ACI Spine Switch | ||
Cisco Nexus 9348GC-FXP Firmware | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372PX-E Firmware | ||
Cisco Nexus 9372TX Firmware | ||
Cisco Nexus 9372TX-E Switch | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware | ||
Cisco NX-OS | >=7.0\(3\)<7.0\(3\)f3\(5\) | |
Cisco Nexus 9500 Series | ||
Cisco Nexus N9K-C9508-FM-R | ||
Cisco x96136yc-r | ||
Cisco Nexus 9636C-R | ||
Cisco Nexus n9k-x9636c-rx | ||
Cisco Nexus N9K-X9636Q-R | ||
Cisco Nexus 36180YC-R | ||
Cisco x9636c-rx | ||
Cisco Nexus 9636C-R | ||
Cisco Nexus N9K-X9636Q-R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1778 has been assigned a high severity rating, indicating serious security risks associated with the vulnerability.
To remediate CVE-2019-1778, it is recommended to upgrade Cisco NX-OS Software to a version that includes the patch for this vulnerability.
CVE-2019-1778 affects Cisco NX-OS Software versions prior to 7.0(3)i7(5) and versions between 7.0(3)i4(9) and 7.0(3)i7(4).
No, CVE-2019-1778 requires local authentication, meaning an attacker must have local access to exploit the vulnerability.
CVE-2019-1778 allows authenticated local attackers to execute arbitrary commands with root privileges on the underlying Linux operating system.