cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-1977,https://securityvulnerability.io/vulnerability/CVE-2019-1977,Cisco Nexus 9000 Series Fabric Switches ACI Mode Border Leaf Endpoint Learning Vulnerability,"A vulnerability within the Endpoint Learning feature of Cisco Nexus 9000 Series Switches running in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an endpoint device in certain circumstances. The vulnerability is due to improper endpoint learning when packets are received on a specific port from outside the ACI fabric and destined to an endpoint located on a border leaf when Disable Remote Endpoint Learning has been enabled. This can result in a Remote (XR) entry being created for the impacted endpoint that will become stale if the endpoint migrates to a different port or leaf switch. This results in traffic not reaching the impacted endpoint until the Remote entry can be relearned by another mechanism.",Cisco,Cisco Nexus 9000 Series Fabric Switches In Aci,6.8,MEDIUM,0.0015899999998509884,false,,false,false,true,2024-08-04T19:16:21.000Z,,false,false,,2019-08-30T09:15:00.000Z,0 CVE-2019-1804,https://securityvulnerability.io/vulnerability/CVE-2019-1804,Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Default SSH Key Vulnerability,"A vulnerability in the SSH key management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user. The vulnerability is due to the presence of a default SSH key pair that is present in all devices. An attacker could exploit this vulnerability by opening an SSH connection via IPv6 to a targeted device using the extracted key materials. An exploit could allow the attacker to access the system with the privileges of the root user. This vulnerability is only exploitable over IPv6; IPv4 is not vulnerable.",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode 11.0.1b,9.8,CRITICAL,0.00343999988399446,false,,false,false,true,2024-08-04T19:16:11.000Z,,false,false,,2019-05-03T17:29:00.000Z,0 CVE-2019-1803,https://securityvulnerability.io/vulnerability/CVE-2019-1803,Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Root Privilege Escalation Vulnerability,"A vulnerability in the filesystem management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker with administrator rights to gain elevated privileges as the root user on an affected device. The vulnerability is due to overly permissive file permissions of specific system files. An attacker could exploit this vulnerability by authenticating to an affected device, creating a crafted command string, and writing this crafted string to a specific file location. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device. The attacker would need to have valid administrator credentials for the device.",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode,7.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:11.000Z,,false,false,,2019-05-03T17:29:00.000Z,0 CVE-2019-1836,https://securityvulnerability.io/vulnerability/CVE-2019-1836,Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Symbolic Link Path Traversal Vulnerability,"A vulnerability in the system shell for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to use symbolic links to overwrite system files. These system files may be sensitive and should not be overwritable by non-root users. The attacker would need valid device credentials. The vulnerability is due to incorrect symbolic link verification of directory paths when they are used in the system shell. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input to specific symbolic link CLI commands. Successful exploitation could allow the attacker to overwrite system files that should be restricted. This vulnerability has been fixed in software version 14.1(1i).",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode,5.5,MEDIUM,0.0004400000034365803,false,,false,false,true,2024-08-04T19:16:13.000Z,,false,false,,2019-05-03T17:29:00.000Z,0 CVE-2019-1589,https://securityvulnerability.io/vulnerability/CVE-2019-1589,Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Unmeasured Boot Vulnerability,"A vulnerability in the Trusted Platform Module (TPM) functionality of software for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, local attacker with physical access to view sensitive information on an affected device. The vulnerability is due to a lack of proper data-protection mechanisms for disk encryption keys that are used within the partitions on an affected device hard drive. An attacker could exploit this vulnerability by obtaining physical access to the affected device to view certain cleartext keys. A successful exploit could allow the attacker to execute a custom boot process or conduct further attacks on an affected device.",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode,4.2,MEDIUM,0.0005200000014156103,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-05-03T15:29:00.000Z,0 CVE-2019-1590,https://securityvulnerability.io/vulnerability/CVE-2019-1590,Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Insecure Fabric Authentication Vulnerability,"A vulnerability in the Transport Layer Security (TLS) certificate validation functionality of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to perform insecure TLS client authentication on an affected device. The vulnerability is due to insufficient TLS client certificate validations for certificates sent between the various components of an ACI fabric. An attacker who has possession of a certificate that is trusted by the Cisco Manufacturing CA and the corresponding private key could exploit this vulnerability by presenting a valid certificate while attempting to connect to the targeted device. An exploit could allow the attacker to gain full control of all other components within the ACI fabric of an affected device.",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode,8.1,HIGH,0.0022499999031424522,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-05-03T15:29:00.000Z,0 CVE-2019-1592,https://securityvulnerability.io/vulnerability/CVE-2019-1592,Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Privilege Escalation Vulnerability,"A vulnerability in the background operations functionality of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker to gain elevated privileges as root on an affected device. The vulnerability is due to insufficient validation of user-supplied files on an affected device. An attacker could exploit this vulnerability by logging in to the CLI of the affected device and creating a crafted file in a specific directory on the filesystem. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device.",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode 11.0.1b,7.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-05-03T15:29:00.000Z,0 CVE-2019-1597,https://securityvulnerability.io/vulnerability/CVE-2019-1597,Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities,"Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets by an affected device. An attacker could exploit these vulnerabilities by sending an LDAP packet crafted using Basic Encoding Rules (BER) to an affected device. The LDAP packet must have a source IP address of an LDAP server configured on the targeted device. A successful exploit could cause the affected device to reload, resulting in a DoS condition. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. Firepower 9300 Security Appliances are affected in versions prior to 2.0.1.201, 2.2.2.54 and 2.3.1.75. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.2(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(2). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(1). Cisco UCS 6200 and 6300 Fabric Interconnect devices are affected in versions prior to 3.2(2b).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Security Appliance,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Cisco Ucs 6200 And 6300 Fabric Interconnect",8.6,HIGH,0.0015699999639764428,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-07T19:29:00.000Z,0 CVE-2019-1588,https://securityvulnerability.io/vulnerability/CVE-2019-1588,Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode Arbitrary File Read Vulnerability,"A vulnerability in the Cisco Nexus 9000 Series Fabric Switches running in Application-Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to read arbitrary files on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms of user-supplied input sent to an affected device. A successful exploit could allow the attacker unauthorized access to read arbitrary files on an affected device. This vulnerability has been fixed in version 14.0(1h).",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode,4.4,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-06T00:00:00.000Z,0 CVE-2019-1591,https://securityvulnerability.io/vulnerability/CVE-2019-1591,Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Shell Escape Vulnerability,"A vulnerability in a specific CLI command implementation of Cisco Nexus 9000 Series ACI Mode Switch Software could allow an authenticated, local attacker to escape a restricted shell on an affected device. The vulnerability is due to insufficient sanitization of user-supplied input when issuing a specific CLI command with parameters on an affected device. An attacker could exploit this vulnerability by authenticating to the device CLI and issuing certain commands. A successful exploit could allow the attacker to escape the restricted shell and execute arbitrary commands with root-level privileges on the affected device. This vulnerability only affects Cisco Nexus 9000 Series ACI Mode Switches that are running a release prior to 14.0(3d).",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode,7.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-06T00:00:00.000Z,0 CVE-2019-1585,https://securityvulnerability.io/vulnerability/CVE-2019-1585,Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode Privilege Escalation Vulnerability,"A vulnerability in the controller authorization functionality of Cisco Nexus 9000 Series ACI Mode Switch Software could allow an authenticated, local attacker to escalate standard users with root privilege on an affected device. The vulnerability is due to a misconfiguration of certain sudoers files for the bashroot component on an affected device. An attacker could exploit this vulnerability by authenticating to the affected device with a crafted user ID, which may allow temporary administrative access to escalate privileges. A successful exploit could allow the attacker to escalate privileges on an affected device. This Vulnerability has been fixed in version 4.0(1h)",Cisco,Cisco Nx-os Software For Nexus 9000 Series Fabric Switches Aci Mode,6.7,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:58.000Z,,false,false,,2019-03-06T00:00:00.000Z,0 CVE-2017-12330,https://securityvulnerability.io/vulnerability/CVE-2017-12330,,"A vulnerability in the CLI of Cisco NX-OS System Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments to the CLI parser. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command and gaining unauthorized access to the underlying operating system of the device. An exploit could allow the attacker to execute arbitrary commands at the user's privilege level. On products that support multiple virtual device contexts (VDCs), this vulnerability could allow an attacker to execute commands at the user's privilege level outside the user's environment. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCve99902, CSCvf14879.",Cisco,Cisco Nexus Series Switches,6.3,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2017-11-30T09:00:00.000Z,0 CVE-2017-12340,https://securityvulnerability.io/vulnerability/CVE-2017-12340,,"A vulnerability in Cisco NX-OS System Software running on Cisco MDS Multilayer Director Switches, Cisco Nexus 7000 Series Switches, and Cisco Nexus 7700 Series Switches could allow an authenticated, local attacker to access the Bash shell of an affected device's operating system, even if the Bash shell is disabled on the system. The vulnerability is due to insufficient sanitization of user-supplied parameters that are passed to certain functions of the Python scripting sandbox of the affected system. An attacker could exploit this vulnerability to escape the scripting sandbox and enter the Bash shell of the operating system with the privileges of the authenticated user for the affected system. To exploit this vulnerability, the attacker must have local access to the affected system and be authenticated to the affected system with administrative or Python execution privileges. Cisco Bug IDs: CSCvd86513.",Cisco,"Cisco Multilayer Director, Nexus 7000 Series, And Nexus 7700 Series Switches",4.2,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2017-11-30T09:00:00.000Z,0 CVE-2017-12342,https://securityvulnerability.io/vulnerability/CVE-2017-12342,,"A vulnerability in the Open Agent Container (OAC) feature of Cisco Nexus Series Switches could allow an unauthenticated, local attacker to read and send packets outside the scope of the OAC. The vulnerability is due to insufficient internal security measures in the OAC feature. An attacker could exploit this vulnerability by crafting specific packets for communication on the device-internal network. A successful exploit could allow the attacker to run code on the underlying host operating system. OAC is not enabled by default. For a device to be vulnerable, an administrator would need to install and activate this feature. This vulnerability affects the following Cisco Nexus Series Switches: Nexus 2000 Series Fabric Extenders, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches. Cisco Bug IDs: CSCve53542, CSCvf36621.",Cisco,Cisco Nexus Series Switches,6.8,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2017-11-30T09:00:00.000Z,0 CVE-2017-6650,https://securityvulnerability.io/vulnerability/CVE-2017-6650,,"A vulnerability in the Telnet CLI command of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into the Telnet CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86771.",Cisco,Cisco Nexus Series Switches,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2017-05-22T01:00:00.000Z,0 CVE-2017-6649,https://securityvulnerability.io/vulnerability/CVE-2017-6649,,"A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.",Cisco,Cisco Nexus Series Switches,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2017-05-22T01:00:00.000Z,0 CVE-2017-3878,https://securityvulnerability.io/vulnerability/CVE-2017-3878,,"A Denial of Service vulnerability in the Telnet remote login functionality of Cisco NX-OS Software running on Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to cause a Telnet process used for login to terminate unexpectedly and the login attempt to fail. There is no impact to user traffic flowing through the device. Affected Products: This vulnerability affects Cisco Nexus 9000 Series Switches that are running Cisco NX-OS Software and are configured to allow remote Telnet connections to the device. More Information: CSCux46778. Known Affected Releases: 7.0(3)I3(0.170). Known Fixed Releases: 7.0(3)I3(1) 7.0(3)I3(0.257) 7.0(3)I3(0.255) 7.0(3)I2(2e) 7.0(3)F1(1.22) 7.0(3)F1(1).",Cisco,Cisco Nexus 9000 Series Switches,5.3,MEDIUM,0.0016400000313296914,false,,false,false,false,,,false,false,,2017-03-17T22:00:00.000Z,0 CVE-2017-3879,https://securityvulnerability.io/vulnerability/CVE-2017-3879,,"A Denial of Service vulnerability in the remote login functionality for Cisco NX-OS Software running on Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to cause a process used for login to terminate unexpectedly and the login attempt to fail. There is no impact to user traffic flowing through the device. The attacker could use either a Telnet or an SSH client for the remote login attempt. Affected Products: This vulnerability affects Cisco Nexus 9000 Series Switches that are running Cisco NX-OS Software and are configured to allow remote Telnet connections to the device. More Information: CSCuy25824. Known Affected Releases: 7.0(3)I3(1) 8.3(0)CV(0.342) 8.3(0)CV(0.345). Known Fixed Releases: 8.3(0)CV(0.362) 8.0(1) 7.0(3)IED5(0.19) 7.0(3)IED5(0) 7.0(3)I4(1) 7.0(3)I4(0.8) 7.0(3)I2(2e) 7.0(3)F1(1.22) 7.0(3)F1(1) 7.0(3)F1(0.230).",Cisco,Cisco Nexus 9000 Series Switches,5.3,MEDIUM,0.0016400000313296914,false,,false,false,false,,,false,false,,2017-03-17T22:00:00.000Z,0 CVE-2017-3875,https://securityvulnerability.io/vulnerability/CVE-2017-3875,,"An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.",Cisco,Cisco Nexus 7000 Series Switches,5.3,MEDIUM,0.0013099999632686377,false,,false,false,false,,,false,false,,2017-03-17T22:00:00.000Z,0 CVE-2016-6457,https://securityvulnerability.io/vulnerability/CVE-2016-6457,,"A vulnerability in the Cisco Nexus 9000 Series Platform Leaf Switches for Application Centric Infrastructure (ACI) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability affects Cisco Nexus 9000 Series Leaf Switches (TOR) - ACI Mode and Cisco Application Policy Infrastructure Controller (APIC). More Information: CSCuy93241. Known Affected Releases: 11.2(2x) 11.2(3x) 11.3(1x) 11.3(2x) 12.0(1x). Known Fixed Releases: 11.2(2i) 11.2(2j) 11.2(3f) 11.2(3g) 11.2(3h) 11.2(3l) 11.3(0.236) 11.3(1j) 11.3(2i) 11.3(2j) 12.0(1r).",Cisco,Cisco Nexus 9000 Series Platform Leaf Switches For Application Centric Infrastructure (aci) 11.2(2x) Through 12.0(1x),6.5,MEDIUM,0.001019999966956675,false,,false,false,false,,,false,false,,2016-11-19T02:45:00.000Z,0