CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
70.5%
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(502292);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/08/23");
script_cve_id("CVE-2024-20399");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/07/23");
script_name(english:"Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2024-20399)");
script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"A vulnerability in the CLI of Cisco NX-OS Software could allow an
authenticated, local attacker to execute arbitrary commands as root on
the underlying operating system of an affected device. This
vulnerability is due to insufficient validation of arguments that are
passed to specific configuration CLI commands. An attacker could
exploit this vulnerability by including crafted input as the argument
of an affected configuration CLI command. A successful exploit could
allow the attacker to execute arbitrary commands on the underlying
operating system with the privileges of root. Note: To successfully
exploit this vulnerability on a Cisco NX-OS device, an attacker must
have Administrator credentials.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
# https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a106946b");
script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-20399");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(78, 78);
script_set_attribute(attribute:"vuln_publication_date", value:"2024/07/01");
script_set_attribute(attribute:"patch_publication_date", value:"2024/07/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/07/09");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2810%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2812%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2814%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2816%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2818%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%282%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2820%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2820a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2822%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2824%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%2824a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%282a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%286%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%286a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%286b%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%288%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%288a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2%288b%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.2%280%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.2%281%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.2%282%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.2%282%29d1%282%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%280%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%280%29dx%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%281%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%282%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%282%29d1%282%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%282%29d1%283%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%282%29d1%283a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%283%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%284%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%285%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%286%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%287%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%288%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%289%29d1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.0%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.1%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.1%282%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.1%282a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%2810%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%2811%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%282%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%283%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%284%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%285%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%286%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%287%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%287a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%288%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2%289%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.3%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.3%282%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%281%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%282%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%283%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%284%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%284a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%285%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%286%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%286a%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%287%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%288%29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.4%289%29");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Tenable.ot");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tenable_ot_api_integration.nasl");
script_require_keys("Tenable.ot/Cisco");
exit(0);
}
include('tenable_ot_cve_funcs.inc');
get_kb_item_or_exit('Tenable.ot/Cisco');
var asset = tenable_ot::assets::get(vendor:'Cisco');
var vuln_cpes = {
"cpe:/o:cisco:nx-os:6.2%282%29" :
{"versionEndIncluding" : "6.2%282%29", "versionStartIncluding" : "6.2%282%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%282a%29" :
{"versionEndIncluding" : "6.2%282a%29", "versionStartIncluding" : "6.2%282a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%286%29" :
{"versionEndIncluding" : "6.2%286%29", "versionStartIncluding" : "6.2%286%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%286a%29" :
{"versionEndIncluding" : "6.2%286a%29", "versionStartIncluding" : "6.2%286a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%286b%29" :
{"versionEndIncluding" : "6.2%286b%29", "versionStartIncluding" : "6.2%286b%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%288%29" :
{"versionEndIncluding" : "6.2%288%29", "versionStartIncluding" : "6.2%288%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%288a%29" :
{"versionEndIncluding" : "6.2%288a%29", "versionStartIncluding" : "6.2%288a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%288b%29" :
{"versionEndIncluding" : "6.2%288b%29", "versionStartIncluding" : "6.2%288b%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2810%29" :
{"versionEndIncluding" : "6.2%2810%29", "versionStartIncluding" : "6.2%2810%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2812%29" :
{"versionEndIncluding" : "6.2%2812%29", "versionStartIncluding" : "6.2%2812%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2814%29" :
{"versionEndIncluding" : "6.2%2814%29", "versionStartIncluding" : "6.2%2814%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2816%29" :
{"versionEndIncluding" : "6.2%2816%29", "versionStartIncluding" : "6.2%2816%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2818%29" :
{"versionEndIncluding" : "6.2%2818%29", "versionStartIncluding" : "6.2%2818%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2820%29" :
{"versionEndIncluding" : "6.2%2820%29", "versionStartIncluding" : "6.2%2820%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2820a%29" :
{"versionEndIncluding" : "6.2%2820a%29", "versionStartIncluding" : "6.2%2820a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2822%29" :
{"versionEndIncluding" : "6.2%2822%29", "versionStartIncluding" : "6.2%2822%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2824%29" :
{"versionEndIncluding" : "6.2%2824%29", "versionStartIncluding" : "6.2%2824%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:6.2%2824a%29" :
{"versionEndIncluding" : "6.2%2824a%29", "versionStartIncluding" : "6.2%2824a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.2%280%29d1%281%29" :
{"versionEndIncluding" : "7.2%280%29d1%281%29", "versionStartIncluding" : "7.2%280%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.2%281%29d1%281%29" :
{"versionEndIncluding" : "7.2%281%29d1%281%29", "versionStartIncluding" : "7.2%281%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.2%282%29d1%281%29" :
{"versionEndIncluding" : "7.2%282%29d1%281%29", "versionStartIncluding" : "7.2%282%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.2%282%29d1%282%29" :
{"versionEndIncluding" : "7.2%282%29d1%282%29", "versionStartIncluding" : "7.2%282%29d1%282%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%280%29d1%281%29" :
{"versionEndIncluding" : "7.3%280%29d1%281%29", "versionStartIncluding" : "7.3%280%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%280%29dx%281%29" :
{"versionEndIncluding" : "7.3%280%29dx%281%29", "versionStartIncluding" : "7.3%280%29dx%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%281%29d1%281%29" :
{"versionEndIncluding" : "7.3%281%29d1%281%29", "versionStartIncluding" : "7.3%281%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%282%29d1%281%29" :
{"versionEndIncluding" : "7.3%282%29d1%281%29", "versionStartIncluding" : "7.3%282%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%282%29d1%282%29" :
{"versionEndIncluding" : "7.3%282%29d1%282%29", "versionStartIncluding" : "7.3%282%29d1%282%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%282%29d1%283%29" :
{"versionEndIncluding" : "7.3%282%29d1%283%29", "versionStartIncluding" : "7.3%282%29d1%283%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%282%29d1%283a%29" :
{"versionEndIncluding" : "7.3%282%29d1%283a%29", "versionStartIncluding" : "7.3%282%29d1%283a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%283%29d1%281%29" :
{"versionEndIncluding" : "7.3%283%29d1%281%29", "versionStartIncluding" : "7.3%283%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%284%29d1%281%29" :
{"versionEndIncluding" : "7.3%284%29d1%281%29", "versionStartIncluding" : "7.3%284%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%285%29d1%281%29" :
{"versionEndIncluding" : "7.3%285%29d1%281%29", "versionStartIncluding" : "7.3%285%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%286%29d1%281%29" :
{"versionEndIncluding" : "7.3%286%29d1%281%29", "versionStartIncluding" : "7.3%286%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%287%29d1%281%29" :
{"versionEndIncluding" : "7.3%287%29d1%281%29", "versionStartIncluding" : "7.3%287%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%288%29d1%281%29" :
{"versionEndIncluding" : "7.3%288%29d1%281%29", "versionStartIncluding" : "7.3%288%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:7.3%289%29d1%281%29" :
{"versionEndIncluding" : "7.3%289%29d1%281%29", "versionStartIncluding" : "7.3%289%29d1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.0%281%29" :
{"versionEndIncluding" : "8.0%281%29", "versionStartIncluding" : "8.0%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.1%281%29" :
{"versionEndIncluding" : "8.1%281%29", "versionStartIncluding" : "8.1%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.1%282%29" :
{"versionEndIncluding" : "8.1%282%29", "versionStartIncluding" : "8.1%282%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.1%282a%29" :
{"versionEndIncluding" : "8.1%282a%29", "versionStartIncluding" : "8.1%282a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%281%29" :
{"versionEndIncluding" : "8.2%281%29", "versionStartIncluding" : "8.2%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%282%29" :
{"versionEndIncluding" : "8.2%282%29", "versionStartIncluding" : "8.2%282%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%283%29" :
{"versionEndIncluding" : "8.2%283%29", "versionStartIncluding" : "8.2%283%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%284%29" :
{"versionEndIncluding" : "8.2%284%29", "versionStartIncluding" : "8.2%284%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%285%29" :
{"versionEndIncluding" : "8.2%285%29", "versionStartIncluding" : "8.2%285%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%286%29" :
{"versionEndIncluding" : "8.2%286%29", "versionStartIncluding" : "8.2%286%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%287%29" :
{"versionEndIncluding" : "8.2%287%29", "versionStartIncluding" : "8.2%287%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%287a%29" :
{"versionEndIncluding" : "8.2%287a%29", "versionStartIncluding" : "8.2%287a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%288%29" :
{"versionEndIncluding" : "8.2%288%29", "versionStartIncluding" : "8.2%288%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%289%29" :
{"versionEndIncluding" : "8.2%289%29", "versionStartIncluding" : "8.2%289%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%2810%29" :
{"versionEndIncluding" : "8.2%2810%29", "versionStartIncluding" : "8.2%2810%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.2%2811%29" :
{"versionEndIncluding" : "8.2%2811%29", "versionStartIncluding" : "8.2%2811%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.3%281%29" :
{"versionEndIncluding" : "8.3%281%29", "versionStartIncluding" : "8.3%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.3%282%29" :
{"versionEndIncluding" : "8.3%282%29", "versionStartIncluding" : "8.3%282%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%281%29" :
{"versionEndIncluding" : "8.4%281%29", "versionStartIncluding" : "8.4%281%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%282%29" :
{"versionEndIncluding" : "8.4%282%29", "versionStartIncluding" : "8.4%282%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%283%29" :
{"versionEndIncluding" : "8.4%283%29", "versionStartIncluding" : "8.4%283%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%284%29" :
{"versionEndIncluding" : "8.4%284%29", "versionStartIncluding" : "8.4%284%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%284a%29" :
{"versionEndIncluding" : "8.4%284a%29", "versionStartIncluding" : "8.4%284a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%285%29" :
{"versionEndIncluding" : "8.4%285%29", "versionStartIncluding" : "8.4%285%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%286%29" :
{"versionEndIncluding" : "8.4%286%29", "versionStartIncluding" : "8.4%286%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%286a%29" :
{"versionEndIncluding" : "8.4%286a%29", "versionStartIncluding" : "8.4%286a%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%287%29" :
{"versionEndIncluding" : "8.4%287%29", "versionStartIncluding" : "8.4%287%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%288%29" :
{"versionEndIncluding" : "8.4%288%29", "versionStartIncluding" : "8.4%288%29", "family" : "NXOS"},
"cpe:/o:cisco:nx-os:8.4%289%29" :
{"versionEndIncluding" : "8.4%289%29", "versionStartIncluding" : "8.4%289%29", "family" : "NXOS"}
};
tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | nx-os | 6.2%2824a%29 | cpe:/o:cisco:nx-os:6.2%2824a%29 |
cisco | nx-os | 7.3%289%29d1%281%29 | cpe:/o:cisco:nx-os:7.3%289%29d1%281%29 |
cisco | nx-os | 7.3%286%29d1%281%29 | cpe:/o:cisco:nx-os:7.3%286%29d1%281%29 |
cisco | nx-os | 8.2%285%29 | cpe:/o:cisco:nx-os:8.2%285%29 |
cisco | nx-os | 7.3%282%29d1%283a%29 | cpe:/o:cisco:nx-os:7.3%282%29d1%283a%29 |
cisco | nx-os | 7.2%282%29d1%282%29 | cpe:/o:cisco:nx-os:7.2%282%29d1%282%29 |
cisco | nx-os | 8.2%282%29 | cpe:/o:cisco:nx-os:8.2%282%29 |
cisco | nx-os | 7.2%282%29d1%281%29 | cpe:/o:cisco:nx-os:7.2%282%29d1%281%29 |
cisco | nx-os | 6.2%288%29 | cpe:/o:cisco:nx-os:6.2%288%29 |
cisco | nx-os | 7.3%282%29d1%281%29 | cpe:/o:cisco:nx-os:7.3%282%29d1%281%29 |
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
70.5%