You are here
Home > Preporuke > Ranjivosti u Cisco NX-OS sistemskom softveru

Ranjivosti u Cisco NX-OS sistemskom softveru

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco NX-OS Software NX-API Arbitrary Command Execution Vulnerability

Advisory ID: cisco-sa-20180620-nx-os-api-execution

Revision: 1.0

For Public Release: 2018 June 20 16:00 GMT

Last Updated: 2018 June 20 16:00 GMT

CVE ID(s): CVE-2018-0313

CVSS Score v(3): 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to send a malicious packet to the management interface on an affected system and execute a command-injection exploit.

The vulnerability is due to incorrect input validation of user-supplied data to the NX-API subsystem. An attacker could exploit this vulnerability by sending a malicious HTTP or HTTPS packet to the management interface of an affected system that has the NX-API feature enabled. A successful exploit could allow the attacker to execute arbitrary commands with root privileges.

Note: NX-API is disabled by default.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-api-execution [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-api-execution”]

This advisory is part of the June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection, which includes 24 Cisco Security Advisories that describe 24 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection [“https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-67770”].

—–BEGIN PGP SIGNATURE—–
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=Tybv
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorPetar Bertok
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivosti u Cisco NX-OS sistemskom softveru

Otkrivena je ranjivost u kontrolnoj točki pristupa (RBAC) u Cisco NX-OS sistemskom softveru. Ranjivost je posljedica netočnog dodjeljivanja privilegija RBAC-a...

Close