Lucene search

K
cve[email protected]CVE-2019-1965
HistoryAug 28, 2019 - 7:15 p.m.

CVE-2019-1965

2019-08-2819:15:11
CWE-400
CWE-772
web.nvd.nist.gov
80
cisco
nx-os
vulnerability
vsh
remote attack
dos
memory depletion
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.4%

A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.

Affected configurations

NVD
Node
cisconx-osRange5.26.2\(29\)
OR
cisconx-osRange7.38.4
AND
ciscomds_9132tMatch-
OR
ciscomds_9148sMatch-
OR
ciscomds_9148tMatch-
OR
ciscomds_9216Match-
OR
ciscomds_9216aMatch-
OR
ciscomds_9216iMatch-
OR
ciscomds_9222iMatch-
OR
ciscomds_9250iMatch-
OR
ciscomds_9396sMatch-
OR
ciscomds_9396tMatch-
OR
ciscomds_9506Match-
OR
ciscomds_9509Match-
OR
ciscomds_9513Match-
OR
ciscomds_9706Match-
OR
ciscomds_9710Match-
OR
ciscomds_9718Match-
Node
cisconx-osRange7.0\(3\)f9.2
AND
ciscon9k-c9504-fm-rMatch-
OR
ciscon9k-c9508-fm-rMatch-
OR
ciscon9k-x96136yc-rMatch-
OR
ciscon9k-x9636c-rMatch-
OR
ciscon9k-x9636c-rxMatch-
OR
ciscon9k-x9636q-rMatch-
OR
cisconexus_36180yc-rMatch-
OR
cisconexus_3636c-rMatch-
OR
ciscox96136yc-rMatch-
OR
ciscox9636c-rMatch-
OR
ciscox9636c-rxMatch-
OR
ciscox9636q-rMatch-
Node
cisconx-osRange<7.1\(5\)n1\(1b\)
OR
cisconx-osRange7.37.3\(5\)n1\(1\)
AND
cisconexus_5010Match-
OR
cisconexus_5020Match-
OR
cisconexus_5548pMatch-
OR
cisconexus_5548upMatch-
OR
cisconexus_5596tMatch-
OR
cisconexus_5596upMatch-
OR
cisconexus_56128pMatch-
OR
cisconexus_5624qMatch-
OR
cisconexus_5648qMatch-
OR
cisconexus_5672upMatch-
OR
cisconexus_5672up-16gMatch-
OR
cisconexus_5696qMatch-
OR
cisconexus_6001Match-
OR
cisconexus_6004Match-
Node
cisconx-osRange<6.2\(22\)
OR
cisconx-osRange7.27.3\(4\)d1\(1\)
OR
cisconx-osRange8.08.2\(3\)
OR
cisconx-osRange8.38.4
AND
cisco7000_10-slotMatch-
OR
cisco7000_18-slotMatch-
OR
cisco7000_4-slotMatch-
OR
cisco7000_9-slotMatch-
OR
cisco7700_10-slotMatch-
OR
cisco7700_18-slotMatch-
OR
cisco7700_2-slotMatch-
OR
cisco7700_6-slotMatch-
OR
ciscon77-f312ck-26Match-
OR
ciscon77-f324fq-25Match-
OR
ciscon77-f348xp-23Match-
OR
ciscon77-f430cq-36Match-
OR
ciscon77-m312cq-26lMatch-
OR
ciscon77-m324fq-25lMatch-
OR
ciscon77-m348xp-23lMatch-
OR
ciscon7k-f248xp-25eMatch-
OR
ciscon7k-f306ck-25Match-
OR
ciscon7k-f312fq-25Match-
OR
ciscon7k-m202cf-22lMatch-
OR
ciscon7k-m206fq-23lMatch-
OR
ciscon7k-m224xp-23lMatch-
OR
ciscon7k-m324fq-25lMatch-
OR
ciscon7k-m348xp-25lMatch-
OR
cisconexus_7000_supervisor_1Match-
OR
cisconexus_7000_supervisor_2Match-
OR
cisconexus_7000_supervisor_2eMatch-
OR
cisconexus_7700_supervisor_2eMatch-
OR
cisconexus_7700_supervisor_3eMatch-
Node
cisconx-osRange<7.0\(3\)i4\(9\)
OR
cisconx-osRange7.0\(3\)i77.0\(3\)i7\(4\)
AND
ciscon9k-c92160yc-xMatch-
OR
ciscon9k-c9236cMatch-
OR
ciscon9k-c9272qMatch-
OR
ciscon9k-c93180lc-exMatch-
OR
ciscon9k-c93180yc-exMatch-
OR
ciscon9k-c93180yc-fxMatch-
OR
ciscon9k-x9732c-exMatch-
OR
ciscon9k-x9736c-fxMatch-
OR
cisconexus_3048Match-
Node
cisconx-osRange7.0\(3\)i77.0\(3\)i7\(6\)
OR
cisconx-osRange9.29.2\(3\)
AND
cisconexus_3524-x\/xlMatch-
OR
cisconexus_3548-x\/xlMatch-
Node
cisconx-osRange<3.2\(3k\)
OR
cisconx-osRange4.04.0\(2e\)
AND
ciscoucs-6296upMatch-
OR
ciscoucs_6248upMatch-
OR
ciscoucs_6324Match-
OR
ciscoucs_6332Match-
OR
ciscoucs_6332-16upMatch-

CNA Affected

[
  {
    "product": "Cisco NX-OS Software",
    "vendor": "Cisco",
    "versions": [
      {
        "lessThan": "8.4(1)",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.4%