First published: Wed Sep 25 2019(Updated: )
A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges, which may lead to complete system compromise. An attacker would need valid administrator credentials to exploit this vulnerability. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-nxos-vman-cmd-inj
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The Cisco NX-OS Software Virtualization Manager Command Injection vulnerability allows an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges.
Users of Cisco NX-OS Software are affected by this vulnerability.
The severity of the Cisco NX-OS Software Virtualization Manager Command Injection vulnerability is rated as medium (CVSS score of 6.7).
Cisco has not provided a specific fix or patch for this vulnerability yet. It is recommended to apply the necessary updates or patches when they become available.
More information about the Cisco NX-OS Software Virtualization Manager Command Injection vulnerability can be found on the Cisco Security Advisory page: [link](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-nxos-vman-cmd-inj).