cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-1614,https://securityvulnerability.io/vulnerability/CVE-2019-1614,Cisco NX-OS Software NX-API Command Injection Vulnerability,"A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The vulnerability is due to incorrect input validation of user-supplied data by the NX-API subsystem. An attacker could exploit this vulnerability by sending malicious HTTP or HTTPS packets to the management interface of an affected system that has the NX-API feature enabled. A successful exploit could allow the attacker to perform a command-injection attack and execute arbitrary commands with root privileges. Note: NX-API is disabled by default. MDS 9000 Series Multilayer Switches are affected running software versions prior to 8.1(1b) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(4). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected running software versions prior to 7.3(4)N1(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 7.3(3)D1(1) and 8.2(3).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 7000 And 7700 Series Switches",8.8,HIGH,0.001069999998435378,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-11T21:29:00.000Z,0 CVE-2019-1611,https://securityvulnerability.io/vulnerability/CVE-2019-1611,Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611),"A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Firepower 4100 Series Next-Generation Firewalls are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. Firepower 9300 Security Appliance are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25) and 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected running software versions prior to 7.1(5)N1(1b) and 7.3(4)N1(1). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Security Appliance,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules",4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-11T21:29:00.000Z,0 CVE-2019-1613,https://securityvulnerability.io/vulnerability/CVE-2019-1613,Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613),"A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(27) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(11) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9), 7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules,Nexus 7000 And 7700 Series Switches",4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-11T21:29:00.000Z,0 CVE-2019-1616,https://securityvulnerability.io/vulnerability/CVE-2019-1616,Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability,"A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow, resulting in process crashes and a DoS condition on the device. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25), 8.1(1b), 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5) Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). UCS 6200, 6300, and 6400 Fabric Interconnects are affected running software versions prior to 3.2(3j) and 4.0(2a).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules,Ucs 6200, 6300, And 6400 Fabric Interconnects",8.6,HIGH,0.0009500000160187483,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-11T21:29:00.000Z,0 CVE-2019-1608,https://securityvulnerability.io/vulnerability/CVE-2019-1608,Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1608),"A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(27), 8.1(1b), and 8.3(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 7000 And 7700 Series Switches",4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-08T20:29:00.000Z,0 CVE-2019-1609,https://securityvulnerability.io/vulnerability/CVE-2019-1609,Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609),"A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(27), 8.1(1b), and 8.3(2). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(6). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3), and 8.3(2). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(9) and7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3500 Platform Switches,Nexus 3000 Series Switches,Nexus 3600 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules",4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-08T20:29:00.000Z,0 CVE-2019-1605,https://securityvulnerability.io/vulnerability/CVE-2019-1605,Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability,"A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to incorrect input validation in the NX-API feature. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS request to an internal service on an affected device that has the NX-API feature enabled. A successful exploit could allow the attacker to cause a buffer overflow and execute arbitrary code as root. Note: The NX-API feature is disabled by default. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.1(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(8). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(2)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 7.3(3)D1(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules",7.8,HIGH,0.0008500000112690032,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-08T20:29:00.000Z,0 CVE-2019-1601,https://securityvulnerability.io/vulnerability/CVE-2019-1601,Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability,"A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to gain read and write access to a critical configuration file. The vulnerability is due to a failure to impose strict filesystem permissions on the targeted device. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow an attacker to use the content of this configuration file to bypass authentication and log in as any user of the device. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches-standalone,Nexus 9500 R-series Line Cards And Fabric Modules",7.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-08T18:29:00.000Z,0 CVE-2019-1600,https://securityvulnerability.io/vulnerability/CVE-2019-1600,Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability,"A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Series Next-generation Firewalls,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches-standalone,Nexus 9500 R-series Line Cards And Fabric Modules",6.7,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-07T20:29:00.000Z,0 CVE-2019-1597,https://securityvulnerability.io/vulnerability/CVE-2019-1597,Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities,"Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets by an affected device. An attacker could exploit these vulnerabilities by sending an LDAP packet crafted using Basic Encoding Rules (BER) to an affected device. The LDAP packet must have a source IP address of an LDAP server configured on the targeted device. A successful exploit could cause the affected device to reload, resulting in a DoS condition. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. Firepower 9300 Security Appliances are affected in versions prior to 2.0.1.201, 2.2.2.54 and 2.3.1.75. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.2(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(2). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(1). Cisco UCS 6200 and 6300 Fabric Interconnect devices are affected in versions prior to 3.2(2b).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Security Appliance,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Cisco Ucs 6200 And 6300 Fabric Interconnect",8.6,HIGH,0.0015699999639764428,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-07T19:29:00.000Z,0 CVE-2019-1598,https://securityvulnerability.io/vulnerability/CVE-2019-1598,Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities,"Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets by an affected device. An attacker could exploit these vulnerabilities by sending an LDAP packet crafted using Basic Encoding Rules (BER) to an affected device. The LDAP packet must have a source IP address of an LDAP server configured on the targeted device. A successful exploit could cause the affected device to reload, resulting in a DoS condition. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. Firepower 9300 Security Appliances are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.2(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(2). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(20), 7.3(2)D1(1), and 8.2(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(1). UCS 6200 and 6300 Fabric Interconnect are affected in versions prior to 3.2(2b).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Security Appliance,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Ucs 6200 And 6300 Fabric Interconnect",8.6,HIGH,0.0015699999639764428,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-07T19:29:00.000Z,0