First published: Wed Feb 23 2022(Updated: )
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation of user supplied data that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP POST request to the NX-API of an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system. Note: The NX-API feature is disabled by default.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | =10.2\(1.72\) | |
Cisco N9k-c9316d-gx | ||
Cisco N9k-c9332d-gx2b | ||
Cisco N9k-c9348d-gx2a | ||
Cisco N9k-c93600cd-gx | ||
Cisco N9k-c9364d-gx2a | ||
Cisco Nexus 3048 | ||
Cisco Nexus 31108pc-v | ||
Cisco Nexus 31108tc-v | ||
Cisco Nexus 31128pq | ||
Cisco Nexus 3132c-z | ||
Cisco Nexus 3132q-v | ||
Cisco Nexus 3132q-x | ||
Cisco Nexus 3132q-xl | ||
Cisco Nexus 3164q | ||
Cisco Nexus 3172pq | ||
Cisco Nexus 3172pq-xl | ||
Cisco Nexus 3172tq-xl | ||
Cisco Nexus 3232c | ||
Cisco Nexus 3264c-e | ||
Cisco Nexus 3264q | ||
Cisco Nexus 3408-s | ||
Cisco Nexus 34180yc | ||
Cisco Nexus 3432d-s | ||
Cisco Nexus 3464c | ||
Cisco Nexus 3524-x | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3548-x | ||
Cisco Nexus 3548-xl | ||
Cisco Nexus 36180yc-r | ||
Cisco Nexus 3636c-r | ||
Cisco Nexus 92160yc-x | ||
Cisco Nexus 92300yc | ||
Cisco Nexus 92304qc | ||
Cisco Nexus 92348gc-x | ||
Cisco Nexus 9236c | ||
Cisco Nexus 9272q | ||
Cisco Nexus 93108tc-ex | ||
Cisco Nexus 93108tc-fx | ||
Cisco Nexus 93108tc-fx3p | ||
Cisco Nexus 93120tx | ||
Cisco Nexus 93180yc-ex | ||
Cisco Nexus 93180yc-fx | ||
Cisco Nexus 93180yc-fx3 | ||
Cisco Nexus 93216tc-fx2 | ||
Cisco Nexus 93240yc-fx2 | ||
Cisco Nexus 9332c | ||
Cisco Nexus 93360yc-fx2 | ||
Cisco Nexus 9336c-fx2 | ||
Cisco Nexus 9336c-fx2-e | ||
Cisco Nexus 9348gc-fxp | ||
Cisco Nexus 9364c | ||
Cisco Nexus 9364c-gx | ||
Cisco Nexus 9504 Switch | ||
Cisco Nexus 9508 Switch | ||
Cisco Nexus 9516 Switch | ||
Cisco Nx-os | =7.3\(8\)n1\(0.4\) | |
Cisco Nexus 5548p | ||
Cisco Nexus 5548up | ||
Cisco Nexus 5596t | ||
Cisco Nexus 5596up | ||
Cisco Nexus 56128p | ||
Cisco Nexus 5672up | ||
Cisco Nexus 5672up-16g | ||
Cisco Nexus 6000 | ||
Cisco Nexus 6001 | ||
Cisco Nexus 6004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Cisco NX-OS vulnerability is CVE-2022-20650.
The severity level of CVE-2022-20650 is critical.
An attacker can exploit this vulnerability by sending malicious input data to the NX-API feature of Cisco NX-OS Software.
The affected software is Cisco NX-OS 10.2(1.72) and Cisco NX-OS 7.3(8)n1(0.4).
You can find more information about this vulnerability at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2