First published: Wed May 15 2019(Updated: )
A vulnerability in the implementation of a CLI diagnostic command in Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to view sensitive system files that should be restricted. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to incomplete role-based access control (RBAC) verification. An attacker could exploit this vulnerability by authenticating to the device and issuing a specific CLI diagnostic command with crafted user-input parameters. An exploit could allow the attacker to perform an arbitrary read of a file on the device, and the file may contain sensitive information. The attacker needs valid device credentials to exploit this vulnerability. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-fxos-info
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FXOS Software | =2.4<2.4.1.101=2.3<2.3.1.111=2.2<2.2.2.91=Prior 2.2<2.2.2.91 | 2.4.1.101 2.3.1.111 2.2.2.91 2.2.2.91 |
Cisco NX-OS Software | ||
Cisco NX-OS Software | =4.0<4.0(1a)=Prior to 4.0<4.0(1a) | 4.0(1a) 4.0(1a) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
It is a vulnerability in the implementation of a CLI diagnostic command in Cisco FXOS Software and Cisco NX-OS Software that allows an authenticated, local attacker to view sensitive system files that should be restricted.
Users of Cisco FXOS Software versions 2.4, 2.3, and 2.2, and Cisco NX-OS Software version 4.0(1a) and prior are affected.
The severity of this vulnerability is medium with a CVSS score of 5.5.
The attacker needs to be authenticated and local to exploit this vulnerability.
No, there is no remedy available for Cisco NX-OS Software at this time.