7.1
CWE
59 22
Advisory Published
Updated

CVE-2019-1836: Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Symbolic Link Path Traversal Vulnerability

First published: Fri May 03 2019(Updated: )

A vulnerability in the system shell for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to use symbolic links to overwrite system files. These system files may be sensitive and should not be overwritable by non-root users. The attacker would need valid device credentials. The vulnerability is due to incorrect symbolic link verification of directory paths when they are used in the system shell. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input to specific symbolic link CLI commands. Successful exploitation could allow the attacker to overwrite system files that should be restricted. This vulnerability has been fixed in software version 14.1(1i).

Credit: ykramarz@cisco.com ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Nx-os=14.0\(3d\)
Cisco Nexus 9300
Cisco Nexus 9500
All of
Cisco Nx-os=14.0\(3d\)
Any of
Cisco Nexus 9300
Cisco Nexus 9500

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this Cisco Nexus 9000 Series Fabric Switches vulnerability?

    The vulnerability ID for this Cisco Nexus 9000 Series Fabric Switches vulnerability is CVE-2019-1836.

  • What is the severity of vulnerability CVE-2019-1836?

    The severity of vulnerability CVE-2019-1836 is high with a severity value of 7.1.

  • How does the vulnerability CVE-2019-1836 affect Cisco Nexus 9000 Series Fabric Switches?

    The vulnerability CVE-2019-1836 allows an authenticated, local attacker to use symbolic links to overwrite system files on Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode.

  • Is Cisco Nexus 9300 affected by vulnerability CVE-2019-1836?

    No, Cisco Nexus 9300 is not affected by vulnerability CVE-2019-1836.

  • Is Cisco Nexus 9500 affected by vulnerability CVE-2019-1836?

    No, Cisco Nexus 9500 is not affected by vulnerability CVE-2019-1836.

  • How can I fix vulnerability CVE-2019-1836?

    To fix vulnerability CVE-2019-1836, Cisco recommends upgrading to a fixed software release.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203