First published: Wed Aug 28 2019(Updated: )
A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | >=5.2<6.2\(29\) | |
Cisco Nx-os | >=7.3<8.4 | |
Cisco Mds 9132t | ||
Cisco Mds 9148s | ||
Cisco Mds 9148t | ||
Cisco Mds 9216 | ||
Cisco Mds 9216a | ||
Cisco Mds 9216i | ||
Cisco Mds 9222i | ||
Cisco Mds 9250i | ||
Cisco Mds 9396s | ||
Cisco Mds 9396t | ||
Cisco Mds 9506 | ||
Cisco Mds 9509 | ||
Cisco Mds 9513 | ||
Cisco Mds 9706 | ||
Cisco Mds 9710 | ||
Cisco Mds 9718 | ||
Cisco Nx-os | >=7.0\(3\)f<9.2 | |
Cisco N9k-c9504-fm-r | ||
Cisco N9k-c9508-fm-r | ||
Cisco N9k-x96136yc-r | ||
Cisco N9k-x9636c-r | ||
Cisco N9k-x9636c-rx | ||
Cisco N9k-x9636q-r | ||
Cisco Nexus 36180yc-r | ||
Cisco Nexus 3636c-r | ||
Cisco X96136yc-r | ||
Cisco X9636c-r | ||
Cisco X9636c-rx | ||
Cisco X9636q-r | ||
Cisco Nx-os | <7.1\(5\)n1\(1b\) | |
Cisco Nx-os | >=7.3<7.3\(5\)n1\(1\) | |
Cisco Nexus 5010 | ||
Cisco Nexus 5020 | ||
Cisco Nexus 5548p | ||
Cisco Nexus 5548up | ||
Cisco Nexus 5596t | ||
Cisco Nexus 5596up | ||
Cisco Nexus 56128p | ||
Cisco Nexus 5624q | ||
Cisco Nexus 5648q | ||
Cisco Nexus 5672up | ||
Cisco Nexus 5672up-16g | ||
Cisco Nexus 5696q | ||
Cisco Nexus 6001 | ||
Cisco Nexus 6004 | ||
Cisco Nx-os | <6.2\(22\) | |
Cisco Nx-os | >=7.2<7.3\(4\)d1\(1\) | |
Cisco Nx-os | >=8.0<8.2\(3\) | |
Cisco Nx-os | >=8.3<8.4 | |
Cisco 7000 10-slot | ||
Cisco 7000 18-slot | ||
Cisco 7000 4-slot | ||
Cisco 7000 9-slot | ||
Cisco 7700 10-slot | ||
Cisco 7700 18-slot | ||
Cisco 7700 2-slot | ||
Cisco 7700 6-slot | ||
Cisco N77-f312ck-26 | ||
Cisco N77-f324fq-25 | ||
Cisco N77-f348xp-23 | ||
Cisco N77-f430cq-36 | ||
Cisco N77-m312cq-26l | ||
Cisco N77-m324fq-25l | ||
Cisco N77-m348xp-23l | ||
Cisco N7k-f248xp-25e | ||
Cisco N7k-f306ck-25 | ||
Cisco N7k-f312fq-25 | ||
Cisco N7k-m202cf-22l | ||
Cisco N7k-m206fq-23l | ||
Cisco N7k-m224xp-23l | ||
Cisco N7k-m324fq-25l | ||
Cisco N7k-m348xp-25l | ||
Cisco Nexus 7000 Supervisor 1 | ||
Cisco Nexus 7000 Supervisor 2 | ||
Cisco Nexus 7000 Supervisor 2e | ||
Cisco Nexus 7700 Supervisor 2e | ||
Cisco Nexus 7700 Supervisor 3e | ||
Cisco Nx-os | <7.0\(3\)i4\(9\) | |
Cisco Nx-os | >=7.0\(3\)i7<7.0\(3\)i7\(4\) | |
Cisco N9k-c92160yc-x | ||
Cisco N9k-c9236c | ||
Cisco N9k-c9272q | ||
Cisco N9k-c93180lc-ex | ||
Cisco N9k-c93180yc-ex | ||
Cisco N9k-c93180yc-fx | ||
Cisco N9k-x9732c-ex | ||
Cisco N9k-x9736c-fx | ||
Cisco Nexus 3048 | ||
Cisco Nx-os | >=7.0\(3\)i7<7.0\(3\)i7\(6\) | |
Cisco Nx-os | >=9.2<9.2\(3\) | |
Cisco Nexus 3524-x\/xl | ||
Cisco Nexus 3548-x\/xl | ||
Cisco Nx-os | <3.2\(3k\) | |
Cisco Nx-os | >=4.0<4.0\(2e\) | |
Cisco Ucs-6296up | ||
Cisco Ucs 6248up | ||
Cisco Ucs 6324 | ||
Cisco Ucs 6332 | ||
Cisco Ucs 6332-16up |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.