Lucene search

K
cve[email protected]CVE-2019-1728
HistoryMay 15, 2019 - 5:29 p.m.

CVE-2019-1728

2019-05-1517:29:01
CWE-347
web.nvd.nist.gov
32
cisco
fxos
nx-os
vulnerability
secure configuration validation
cve-2019-1728
nvd
system boot time
root privileges
local attacker
authenticated
arbitrary commands
administrative credentials
security

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the Secure Configuration Validation functionality of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to run arbitrary commands at system boot time with the privileges of root. The vulnerability is due to a lack of proper validation of system files when the persistent configuration information is read from the file system. An attacker could exploit this vulnerability by authenticating to the device and overwriting the persistent configuration storage with malicious executable files. An exploit could allow the attacker to run arbitrary commands at system startup and those commands will run as the root user. The attacker must have valid administrative credentials for the device.

Affected configurations

NVD
Node
cisconx-osRange8.18.1\(1b\)
OR
cisconx-osRange8.28.3\(1\)
AND
ciscomds_9000Match-
OR
ciscomds_9100Match-
OR
ciscomds_9200Match-
OR
ciscomds_9500Match-
OR
ciscomds_9700Match-
Node
cisconx-osRange7.0\(3\)i77.0\(3\)i7\(3\)
AND
cisconexus_3000Match-
OR
cisconexus_3100Match-
OR
cisconexus_3100-zMatch-
OR
cisconexus_3100vMatch-
OR
cisconexus_3200Match-
OR
cisconexus_3400Match-
OR
cisconexus_3500Match-
OR
cisconexus_3600Match-
OR
cisconexus_9000Match-
OR
cisconexus_9200Match-
OR
cisconexus_9300Match-
OR
cisconexus_9500Match-
Node
cisconx-osRange6.0\(2\)a86.0\(2\)a8\(11\)
OR
cisconx-osRange7.0\(3\)7.0\(3\)i7\(3\)
AND
cisconexus_3524-xMatch-
OR
cisconexus_3524-xlMatch-
OR
cisconexus_3548-xMatch-
OR
cisconexus_3548-xlMatch-
Node
cisconx-osRange7.37.3\(4\)n1\(1\)
AND
cisconexus_5500Match-
OR
cisconexus_5600Match-
OR
cisconexus_6000Match-
Node
cisconx-osRange6.26.2\(22\)
OR
cisconx-osRange7.27.3\(3\)d1\(1\)
OR
cisconx-osRange8.08.3\(1\)
AND
cisconexus_7000Match-
OR
cisconexus_7700Match-
Node
cisconx-osRange4.04.0\(1a\)
AND
ciscoucs_6248upMatch-
OR
ciscoucs_6296upMatch-
OR
ciscoucs_6332Match-
OR
ciscousc_6324Match-
OR
ciscousc_6332-16upMatch-
Node
cisconx-osRange2.42.4.1.101
AND
ciscofirepower_4110Match-
OR
ciscofirepower_4115Match-
OR
ciscofirepower_4120Match-
OR
ciscofirepower_4125Match-
OR
ciscofirepower_4140Match-
OR
ciscofirepower_4145Match-
OR
ciscofirepower_4150Match-
OR
ciscofirepower_9300Match-

CNA Affected

[
  {
    "product": "Cisco NX-OS Software",
    "vendor": "Cisco",
    "versions": [
      {
        "lessThan": "8.3(1)",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2019-1728