Lucene search

K
cveCiscoCVE-2019-1727
HistoryMay 15, 2019 - 5:29 p.m.

CVE-2019-1727

2019-05-1517:29:01
CWE-264
CWE-78
cisco
web.nvd.nist.gov
34
cisco
nx-os
vulnerability
python
scripting
sandbox
local attacker
privilege escalation
cve-2019-1727
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

5.2%

A vulnerability in the Python scripting subsystem of Cisco NX-OS Software could allow an authenticated, local attacker to escape the Python parser and issue arbitrary commands to elevate the attacker’s privilege level. The vulnerability is due to insufficient sanitization of user-supplied parameters that are passed to certain Python functions in the scripting sandbox of the affected device. An attacker could exploit this vulnerability to escape the scripting sandbox and execute arbitrary commands to elevate the attacker’s privilege level. To exploit this vulnerability, the attacker must have local access and be authenticated to the targeted device with administrative or Python execution privileges. These requirements could limit the possibility of a successful exploit.

Affected configurations

Nvd
Vulners
Node
cisconx-osRange5.28.1\(1b\)
OR
cisconx-osRange8.28.3\(1\)
AND
ciscomds_9000Match-
OR
ciscomds_9100Match-
OR
ciscomds_9200Match-
OR
ciscomds_9500Match-
OR
ciscomds_9700Match-
Node
cisconx-osRange7.0\(3\)i47.0\(3\)i4\(8\)
OR
cisconx-osRange7.0\(3\)i57.0\(3\)i7\(3\)
AND
cisconexus_3000Match-
OR
cisconexus_3100Match-
OR
cisconexus_3100-zMatch-
OR
cisconexus_3100vMatch-
OR
cisconexus_3200Match-
OR
cisconexus_3400Match-
OR
cisconexus_3500Match-
OR
cisconexus_3524-xMatch-
OR
cisconexus_3524-xlMatch-
OR
cisconexus_3548-xMatch-
OR
cisconexus_3548-xlMatch-
OR
cisconexus_3600Match-
OR
cisconexus_9000Match-
OR
cisconexus_9200Match-
OR
cisconexus_9300Match-
OR
cisconexus_9500Match-
Node
cisconx-osRange7.37.3\(4\)n1\(1\)
AND
cisconexus_5500Match-
OR
cisconexus_5600Match-
OR
cisconexus_6000Match-
Node
cisconx-osRange6.27.3\(3\)d1\(1\)
OR
cisconx-osRange8.08.3\(1\)
AND
cisconexus_7000Match-
OR
cisconexus_7700Match-
VendorProductVersionCPE
cisconx-os*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
ciscomds_9000-cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*
ciscomds_9100-cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*
ciscomds_9200-cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*
ciscomds_9500-cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*
ciscomds_9700-cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*
cisconexus_3000-cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*
cisconexus_3100-cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*
cisconexus_3100-z-cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*
cisconexus_3100v-cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 271

CNA Affected

[
  {
    "product": "Cisco NX-OS Software",
    "vendor": "Cisco",
    "versions": [
      {
        "lessThan": "6.2(25)",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "8.3(2)",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "7.0(3)I7(3)",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "9.2(1)",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

5.2%

Related for CVE-2019-1727