Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1591— Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Shell Escape Vulnerability

EPSS 0.24% · P47
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-1591

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Shell Escape Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in a specific CLI command implementation of Cisco Nexus 9000 Series ACI Mode Switch Software could allow an authenticated, local attacker to escape a restricted shell on an affected device. The vulnerability is due to insufficient sanitization of user-supplied input when issuing a specific CLI command with parameters on an affected device. An attacker could exploit this vulnerability by authenticating to the device CLI and issuing certain commands. A successful exploit could allow the attacker to escape the restricted shell and execute arbitrary commands with root-level privileges on the affected device. This vulnerability only affects Cisco Nexus 9000 Series ACI Mode Switches that are running a release prior to 14.0(3d).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
权限、特权和访问控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Nexus 9000 Series ACI Mode Switch Software 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Nexus 9000 Series ACI Mode Switch Software 14.0(3d)之前版本中的CLI命令的实现存在权限许可和访问控制漏洞,该漏洞源于程序没有充分地过滤用户提交的输入。本地攻击者可通过向设备的CLI进行身份验证并发送命令利用该漏洞绕过被限制的shell,以root级别的权限执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode 14.0(3d) -

II. Public POCs for CVE-2019-1591

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-1591

登录查看更多情报信息。

Same Patch Batch · Cisco · 2019-03-06 · 6 CVEs total

CVE-2019-1588Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode Arbitrary
CVE-2019-1593Cisco NX-OS Software Bash Shell Role-Based Access Control Bypass Privilege Escalation Vuln
CVE-2019-1594Cisco NX-OS Software 802.1X Extensible Authentication Protocol over LAN Denial of Service
CVE-2019-1595Cisco Nexus 5600 and 6000 Series Switches Fibre Channel over Ethernet Denial of Service Vu
CVE-2019-1585Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode Privilege

IV. Related Vulnerabilities

V. Comments for CVE-2019-1591

No comments yet


Leave a comment