QID 316978

Date Published: 2021-06-10

QID 316978: Cisco NX-OS Software CLI Bypass to Internal Service Vulnerability(cisco-sa-20190515-nxos-cli-bypass)

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated,
local attacker to access internal services that should be restricted
on an affected device, such as the NX-API.

Affected Products
Cisco products if they are running a vulnerable release of Cisco NX-OS Software:
MDS 9000 Series Multilayer Switches
Nexus 3000 Series Switches
Nexus 3500 Platform Switches
Nexus 3600 Platform Switches
Nexus 5500 Platform Switches
Nexus 5600 Platform Switches
Nexus 6000 Series Switches
Nexus 7000 Series Switches
Nexus 7700 Series Switches
Nexus 9000 Series Switches in standalone NX-OS mode
Nexus 9500 R-Series Switching Platform (NOT SUPPORTED)
UCS 6200 Series Fabric Interconnects
UCS 6300 Series Fabric Interconnects
UCS 6400 Series Fabric Interconnects

QID Detection Logic(Authenticated):
It checks for vulnerable version of Cisco NX-OS using show version Command.

A successful exploit could allow the attacker to bypass intended restrictions and access internal services of the device.
An attacker would need valid device credentials to exploit this vulnerability.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 4.6 severity.
  • Solution

    Customers are advised to refer to cisco-sa-20190515-nxos-cli-bypass for more information.

    CVEs related to QID 316978

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-20190515-nxos-cli-bypass URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cli-bypass