First published: Thu Aug 29 2019(Updated: )
A vulnerability in a specific CLI command within the local management (local-mgmt) context for Cisco UCS Fabric Interconnect Software could allow an authenticated, local attacker to gain elevated privileges as the root user on an affected device. The vulnerability is due to extraneous subcommand options present for a specific CLI command within the local-mgmt context. An attacker could exploit this vulnerability by authenticating to an affected device, entering the local-mgmt context, and issuing a specific CLI command and submitting user input. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device. The attacker would need to have valid user credentials for the device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | <=3.2 | |
Cisco Nx-os | =4.0 | |
Cisco Ucs 6248 Up Fabric Interconnect | ||
Cisco Ucs 6296 Up Fabric Interconnect | ||
Cisco Ucs 6324 Fabric Interconnect | ||
Cisco Ucs 6332-16up Fabric Interconnect | ||
Cisco Ucs 6332 Fabric Interconnect | ||
Cisco Ucs 6454 Fabric Interconnect | ||
Cisco Unified Computing System | =3.2\(3b\)a | |
Cisco Unified Computing System | =4.0\(1a\)a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1966.
The severity of CVE-2019-1966 is high, with a severity value of 7.8.
CVE-2019-1966 allows an authenticated, local attacker to gain elevated privileges as the root user on an affected device running Cisco UCS Fabric Interconnect Software.
The affected software includes Cisco Nx-os versions up to and including 3.2, as well as Cisco Nx-os version 4.0.
To fix CVE-2019-1966, it is recommended to upgrade to a fixed software release as described in the vendor advisory.