A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss | Vendor Advisory |
http://www.securityfocus.com/bid/98531 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038518 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-05-21 18:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-6649
Mitre link : CVE-2017-6649
JSON object : View
CWE
Products Affected
cisco
- nexus_5596up
- nexus_5624q
- nexus_5648q
- nexus_5672up
- nexus_5696q
- nexus_5548up
- nexus_56128p
- nx-os
- nexus_5596t
- nexus_5672up-16g