cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-1611,https://securityvulnerability.io/vulnerability/CVE-2019-1611,Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611),"A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Firepower 4100 Series Next-Generation Firewalls are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. Firepower 9300 Security Appliance are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25) and 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected running software versions prior to 7.1(5)N1(1b) and 7.3(4)N1(1). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Security Appliance,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules",4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-11T21:29:00.000Z,0 CVE-2019-1613,https://securityvulnerability.io/vulnerability/CVE-2019-1613,Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613),"A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(27) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(11) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9), 7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules,Nexus 7000 And 7700 Series Switches",4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-11T21:29:00.000Z,0 CVE-2019-1616,https://securityvulnerability.io/vulnerability/CVE-2019-1616,Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability,"A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow, resulting in process crashes and a DoS condition on the device. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25), 8.1(1b), 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5) Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). UCS 6200, 6300, and 6400 Fabric Interconnects are affected running software versions prior to 3.2(3j) and 4.0(2a).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules,Ucs 6200, 6300, And 6400 Fabric Interconnects",8.6,HIGH,0.0009500000160187483,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-11T21:29:00.000Z,0 CVE-2019-1614,https://securityvulnerability.io/vulnerability/CVE-2019-1614,Cisco NX-OS Software NX-API Command Injection Vulnerability,"A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The vulnerability is due to incorrect input validation of user-supplied data by the NX-API subsystem. An attacker could exploit this vulnerability by sending malicious HTTP or HTTPS packets to the management interface of an affected system that has the NX-API feature enabled. A successful exploit could allow the attacker to perform a command-injection attack and execute arbitrary commands with root privileges. Note: NX-API is disabled by default. MDS 9000 Series Multilayer Switches are affected running software versions prior to 8.1(1b) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(4). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected running software versions prior to 7.3(4)N1(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 7.3(3)D1(1) and 8.2(3).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 7000 And 7700 Series Switches",8.8,HIGH,0.001069999998435378,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-11T21:29:00.000Z,0 CVE-2019-1607,https://securityvulnerability.io/vulnerability/CVE-2019-1607,Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1607),"A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3).",Cisco,Nexus 7000 And 7700 Series Switches,4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-08T20:29:00.000Z,0 CVE-2019-1608,https://securityvulnerability.io/vulnerability/CVE-2019-1608,Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1608),"A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(27), 8.1(1b), and 8.3(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 7000 And 7700 Series Switches",4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-08T20:29:00.000Z,0 CVE-2019-1609,https://securityvulnerability.io/vulnerability/CVE-2019-1609,Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609),"A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(27), 8.1(1b), and 8.3(2). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(6). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3), and 8.3(2). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(9) and7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3500 Platform Switches,Nexus 3000 Series Switches,Nexus 3600 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules",4.2,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-08T20:29:00.000Z,0 CVE-2019-1605,https://securityvulnerability.io/vulnerability/CVE-2019-1605,Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability,"A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to incorrect input validation in the NX-API feature. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS request to an internal service on an affected device that has the NX-API feature enabled. A successful exploit could allow the attacker to cause a buffer overflow and execute arbitrary code as root. Note: The NX-API feature is disabled by default. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.1(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(8). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(2)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 7.3(3)D1(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules",7.8,HIGH,0.0008500000112690032,false,,false,false,true,2024-08-04T19:16:00.000Z,,false,false,,2019-03-08T20:29:00.000Z,0 CVE-2019-1604,https://securityvulnerability.io/vulnerability/CVE-2019-1604,Cisco NX-OS Software Privilege Escalation Vulnerability,"A vulnerability in the user account management interface of Cisco NX-OS Software could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to an incorrect authorization check of user accounts and their associated Group ID (GID). An attacker could exploit this vulnerability by taking advantage of a logic error that will permit the use of higher privileged commands than what is necessarily assigned. A successful exploit could allow an attacker to execute commands with elevated privileges on the underlying Linux shell of an affected device. Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 8.2(3), and 8.3(2). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Nexus 7000 And 7700 Series Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 9000 Series Switches-standalone,Nexus 9500 R-series Line Cards And Fabric Modules",7.3,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-08T19:29:00.000Z,0 CVE-2019-1601,https://securityvulnerability.io/vulnerability/CVE-2019-1601,Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability,"A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to gain read and write access to a critical configuration file. The vulnerability is due to a failure to impose strict filesystem permissions on the targeted device. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow an attacker to use the content of this configuration file to bypass authentication and log in as any user of the device. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches-standalone,Nexus 9500 R-series Line Cards And Fabric Modules",7.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-08T18:29:00.000Z,0 CVE-2019-1599,https://securityvulnerability.io/vulnerability/CVE-2019-1599,Cisco NX-OS Software Netstack Denial of Service Vulnerability,"A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition. Note: This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device. Nexus 1000V Switch for Microsoft Hyper-V is affected in versions prior to 5.2(1)SM3(2.1). Nexus 1000V Switch for VMware vSphere is affected in versions prior to 5.2(1)SV3(4.1a). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(6) and 9.2(2). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(11), 7.0(3)I7(6), and 9.2(2). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5) and 9.2(2). Nexus 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(5)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22. Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5) and 9.2(2). UCS 6200 and 6300 Series Fabric Interconnect are affected in versions prior to 3.2(3j) and 4.0(2a). UCS 6400 Series Fabric Interconnect are affected in versions prior to 4.0(2a).",Cisco,"Nexus 1000v Switch For Microsoft Hyper-v,Nexus 1000v Switch For Vmware Vsphere,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Nexus 9500 R-series Line Cards And Fabric Modules,Ucs 6200 And 6300 Series Fabric Interconnect,Ucs 6400 Series Fabric Interconnect",8.6,HIGH,0.0009599999757483602,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-07T20:29:00.000Z,0 CVE-2019-1600,https://securityvulnerability.io/vulnerability/CVE-2019-1600,Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability,"A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Series Next-generation Firewalls,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches-standalone,Nexus 9500 R-series Line Cards And Fabric Modules",6.7,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-07T20:29:00.000Z,0 CVE-2019-1597,https://securityvulnerability.io/vulnerability/CVE-2019-1597,Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities,"Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets by an affected device. An attacker could exploit these vulnerabilities by sending an LDAP packet crafted using Basic Encoding Rules (BER) to an affected device. The LDAP packet must have a source IP address of an LDAP server configured on the targeted device. A successful exploit could cause the affected device to reload, resulting in a DoS condition. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. Firepower 9300 Security Appliances are affected in versions prior to 2.0.1.201, 2.2.2.54 and 2.3.1.75. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.2(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(2). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(1). Cisco UCS 6200 and 6300 Fabric Interconnect devices are affected in versions prior to 3.2(2b).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Security Appliance,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Cisco Ucs 6200 And 6300 Fabric Interconnect",8.6,HIGH,0.0015699999639764428,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-07T19:29:00.000Z,0 CVE-2019-1598,https://securityvulnerability.io/vulnerability/CVE-2019-1598,Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities,"Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets by an affected device. An attacker could exploit these vulnerabilities by sending an LDAP packet crafted using Basic Encoding Rules (BER) to an affected device. The LDAP packet must have a source IP address of an LDAP server configured on the targeted device. A successful exploit could cause the affected device to reload, resulting in a DoS condition. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. Firepower 9300 Security Appliances are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.2(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(2). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(20), 7.3(2)D1(1), and 8.2(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(1). UCS 6200 and 6300 Fabric Interconnect are affected in versions prior to 3.2(2b).",Cisco,"Firepower 4100 Series Next-generation Firewalls,Firepower 9300 Security Appliance,Mds 9000 Series Multilayer Switches,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Switches In Standalone Nx-os Mode,Ucs 6200 And 6300 Fabric Interconnect",8.6,HIGH,0.0015699999639764428,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-07T19:29:00.000Z,0 CVE-2019-1594,https://securityvulnerability.io/vulnerability/CVE-2019-1594,Cisco NX-OS Software 802.1X Extensible Authentication Protocol over LAN Denial of Service Vulnerability,"A vulnerability in the 802.1X implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete input validation of Extensible Authentication Protocol over LAN (EAPOL) frames. An attacker could exploit this vulnerability by sending a crafted EAPOL frame to an interface on the targeted device. A successful exploit could allow the attacker to cause the Layer 2 (L2) forwarding process to restart multiple times, leading to a system-level restart of the device and a DoS condition. Note: This vulnerability affects only NX-OS devices configured with 802.1X functionality. Cisco Nexus 1000V Switch for VMware vSphere devices are affected in versions prior to 5.2(1)SV3(1.4b). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(5)N1(1) and 7.1(5)N1(1b). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(3). Nexus 9000 Series Fabric Switches in ACI Mode are affected in versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(4).",Cisco,"Nexus 1000v Switch For Vmware Vsphere,Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 2000, 5500, 5600, And 6000 Series Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Fabric Switches In Aci Mode,Nexus 9000 Series Switches In Standalone Nx-os Mode",7.4,HIGH,0.0005499999970197678,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-06T00:00:00.000Z,0 CVE-2019-1593,https://securityvulnerability.io/vulnerability/CVE-2019-1593,Cisco NX-OS Software Bash Shell Role-Based Access Control Bypass Privilege Escalation Vulnerability,"A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level by executing commands authorized to other user roles. The attacker must authenticate with valid user credentials. The vulnerability is due to the incorrect implementation of a Bash shell command that allows role-based access control (RBAC) to be bypassed. An attacker could exploit this vulnerability by authenticating to the device and entering a crafted command at the Bash prompt. A successful exploit could allow the attacker to escalate their privilege level by executing commands that should be restricted to other roles. For example, a dev-ops user could escalate their privilege level to admin with a successful exploit of this vulnerability.",Cisco,"Nexus 3000 Series Switches,Nexus 3500 Platform Switches,Nexus 3600 Platform Switches,Nexus 7000 And 7700 Series Switches,Nexus 9000 Series Fabric Switches In Aci Mode,Nexus 9000 Series Switches In Standalone Nx-os Mode",7.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-04T19:15:59.000Z,,false,false,,2019-03-06T00:00:00.000Z,0 CVE-2017-12340,https://securityvulnerability.io/vulnerability/CVE-2017-12340,,"A vulnerability in Cisco NX-OS System Software running on Cisco MDS Multilayer Director Switches, Cisco Nexus 7000 Series Switches, and Cisco Nexus 7700 Series Switches could allow an authenticated, local attacker to access the Bash shell of an affected device's operating system, even if the Bash shell is disabled on the system. The vulnerability is due to insufficient sanitization of user-supplied parameters that are passed to certain functions of the Python scripting sandbox of the affected system. An attacker could exploit this vulnerability to escape the scripting sandbox and enter the Bash shell of the operating system with the privileges of the authenticated user for the affected system. To exploit this vulnerability, the attacker must have local access to the affected system and be authenticated to the affected system with administrative or Python execution privileges. Cisco Bug IDs: CSCvd86513.",Cisco,"Cisco Multilayer Director, Nexus 7000 Series, And Nexus 7700 Series Switches",4.2,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2017-11-30T09:00:00.000Z,0 CVE-2017-3875,https://securityvulnerability.io/vulnerability/CVE-2017-3875,,"An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.",Cisco,Cisco Nexus 7000 Series Switches,5.3,MEDIUM,0.0013099999632686377,false,,false,false,false,,,false,false,,2017-03-17T22:00:00.000Z,0 CVE-2017-3804,https://securityvulnerability.io/vulnerability/CVE-2017-3804,,"A vulnerability in Intermediate System-to-Intermediate System (IS-IS) protocol packet processing of Cisco Nexus 5000, 6000, and 7000 Series Switches software could allow an unauthenticated, adjacent attacker to cause a reload of the affected device. Switches in the FabricPath domain crash because of an __inst_001__isis_fabricpath hap reset when processing a crafted link-state packet. More Information: CSCvc45002. Known Affected Releases: 7.1(3)N1(2.1) 7.1(3)N1(3.12) 7.3(2)N1(0.296) 8.0(1)S2. Known Fixed Releases: 6.2(18)S11 7.0(3)I5(1.170) 7.0(3)I5(2) 7.1(4)N1(0.4) 7.1(4)N1(1b) 7.1(5)N1(0.986) 7.1(5)N1(1) 7.2(3)D1(0.8) 7.3(2)N1(0.304) 7.3(2)N1(1) 8.0(0.96)S0 8.0(1) 8.0(1)E1 8.0(1)S4 8.3(0)CV(0.788).",Cisco,"Cisco Nexus 5000, 6000, 7000",6.1,MEDIUM,0.0009200000204145908,false,,false,false,false,,,false,false,,2017-01-26T07:45:00.000Z,0 CVE-2014-2201,https://securityvulnerability.io/vulnerability/CVE-2014-2201,,"The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915.",Cisco,"Nx-os,Nexus 7000,Nexus 7000 10-slot,Nexus 7000 18-slot,Nexus 7000 9-slot",,,0.001560000004246831,false,,false,false,false,,,false,false,,2014-05-26T00:25:00.000Z,0 CVE-2013-1191,https://securityvulnerability.io/vulnerability/CVE-2013-1191,,"Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400.",Cisco,"Nx-os,Nexus 7000,Nexus 7000 10-slot,Nexus 7000 18-slot,Nexus 7000 9-slot",,,0.001550000044517219,false,,false,false,false,,,false,false,,2014-05-26T00:25:00.000Z,0 CVE-2014-0684,https://securityvulnerability.io/vulnerability/CVE-2014-0684,,"Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136.",Cisco,"Nx-os,Nexus 7000,Nexus 7000 10-slot,Nexus 7000 18-slot,Nexus 7000 9-slot",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2014-05-07T10:00:00.000Z,0 CVE-2012-4090,https://securityvulnerability.io/vulnerability/CVE-2012-4090,,"The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089.",Cisco,"Nx-os,Nexus 7000,Nexus 7000 10-slot,Nexus 7000 18-slot,Nexus 7000 9-slot",,,0.0023799999617040157,false,,false,false,false,,,false,false,,2013-10-05T10:00:00.000Z,0 CVE-2013-1226,https://securityvulnerability.io/vulnerability/CVE-2013-1226,,"The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098.",Cisco,"Nx-os,Nexus 7000,Nexus 7000 10-slot,Nexus 7000 18-slot,Nexus 7000 9-slot",,,0.0013099999632686377,false,,false,false,false,,,false,false,,2013-04-29T12:20:00.000Z,0 CVE-2013-1178,https://securityvulnerability.io/vulnerability/CVE-2013-1178,,"Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.",Cisco,"Nx-os,Nexus 7000,Nexus 7000 10-slot,Nexus 7000 18-slot,Nexus 7000 9-slot",,,0.006370000075548887,false,,false,false,false,,,false,false,,2013-04-25T10:55:00.000Z,0