First published: Fri May 03 2019(Updated: )
A vulnerability in the system shell for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to use symbolic links to overwrite system files. These system files may be sensitive and should not be overwritable by non-root users. The attacker would need valid device credentials. The vulnerability is due to incorrect symbolic link verification of directory paths when they are used in the system shell. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input to specific symbolic link CLI commands. Successful exploitation could allow the attacker to overwrite system files that should be restricted. This vulnerability has been fixed in software version 14.1(1i).
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | =14.0\(3d\) | |
Cisco Nexus 9300 | ||
Cisco Nexus 9500 | ||
All of | ||
Cisco Nx-os | =14.0\(3d\) | |
Any of | ||
Cisco Nexus 9300 | ||
Cisco Nexus 9500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Nexus 9000 Series Fabric Switches vulnerability is CVE-2019-1836.
The severity of vulnerability CVE-2019-1836 is high with a severity value of 7.1.
The vulnerability CVE-2019-1836 allows an authenticated, local attacker to use symbolic links to overwrite system files on Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode.
No, Cisco Nexus 9300 is not affected by vulnerability CVE-2019-1836.
No, Cisco Nexus 9500 is not affected by vulnerability CVE-2019-1836.
To fix vulnerability CVE-2019-1836, Cisco recommends upgrading to a fixed software release.