A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/98531 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038518 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-05-22 01:29
Updated : 2024-02-04 19:11
NVD link : CVE-2017-6649
Mitre link : CVE-2017-6649
CVE.ORG link : CVE-2017-6649
JSON object : View
Products Affected
cisco
- nexus_5624q
- nexus_56128p
- nexus_5648q
- nexus_5548up
- nexus_5672up-16g
- nexus_5696q
- nexus_5672up
- nx-os
- nexus_5596up
- nexus_5596t