Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0293

EPSS 1.88% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-0293

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in role-based access control (RBAC) for Cisco NX-OS Software could allow an authenticated, remote attacker to execute CLI commands that should be restricted for a nonadministrative user. The attacker would have to possess valid user credentials for the device. The vulnerability is due to incorrect RBAC privilege assignment for certain CLI commands. An attacker could exploit this vulnerability by authenticating to a device as a nonadministrative user and executing specific commands from the CLI. An exploit could allow the attacker to run commands that should be restricted to administrative users. These commands could modify the configuration or boot image on the device. This vulnerability affects MDS 9000 Series Multilayer Switches, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvd77904.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
权限、特权和访问控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Cisco产品NX-OS Software role-based access control 权限许可和访问控制漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Nexus 2000 Series Switches等都是美国思科(Cisco)公司的产品。Cisco Nexus 2000 Series Switches等都是交换机设备。Fabric Modules是一款交换机矩阵模块。NX-OS Software是运行在其中的一套交换机使用的数据中心级操作系统软件。role-based access control(RBAC)是其中的一个基于角色的访问控制组件。 多款Cisco产品中的NX-OS Software的RBAC存在提权漏洞,该漏洞源于程序为C
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Cisco NX-OS unknown Cisco NX-OS unknown -

II. Public POCs for CVE-2018-0293

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-0293

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-06-20 · 29 CVEs total

CVE-2018-12601sam2p 缓冲区错误漏洞
CVE-2018-12592Polycom RealPresence Web Suite 安全漏洞
CVE-2018-12591Ubiquiti EdgeSwitch 安全漏洞
CVE-2018-12590Ubiquiti EdgeSwitch 安全漏洞
CVE-2018-12446com.dropbox.android application for Android 安全漏洞
CVE-2018-12445com.dropbox.android application for Android 安全漏洞
CVE-2018-12594Reliable Controls MACH-ProWebCom 安全漏洞
CVE-2018-6563totemomail Encryption Gateway 跨站请求伪造漏洞
CVE-2018-12558Perl Email::Address模块安全漏洞
CVE-2018-12327NTP 缓冲区错误漏洞
CVE-2018-9036CheckSec Canopy 跨站脚本漏洞
CVE-2018-6211D-Link DIR-620 操作系统命令注入漏洞
CVE-2018-6212D-Link DIR-620 跨站脚本漏洞
CVE-2018-6213D-Link DIR-620 Web server 安全漏洞
CVE-2018-0291多款Cisco产品NX-OS Software Simple Network Management Protocol input packet processor 安全漏洞
CVE-2018-12600ImageMagick 缓冲区错误漏洞
CVE-2018-12599ImageMagick 缓冲区错误漏洞
CVE-2018-12604GreenCMS 安全漏洞
CVE-2018-0330多款Cisco产品NX-OS Software NX-API management API 权限许可和访问控制漏洞
CVE-2018-0314多款Cisco产品FXOS Software和NX-OS Software Fabric Services组件输入验证漏洞

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-0293

No comments yet


Leave a comment