—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Cisco Security Advisory: Cisco NX-OS Software NX-API Arbitrary Command Execution Vulnerability
Advisory ID: cisco-sa-20180620-nx-os-api-execution
Revision: 1.0
For Public Release: 2018 June 20 16:00 GMT
Last Updated: 2018 June 20 16:00 GMT
CVE ID(s): CVE-2018-0313
CVSS Score v(3): 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
+———————————————————————
Summary
=======
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to send a malicious packet to the management interface on an affected system and execute a command-injection exploit.
The vulnerability is due to incorrect input validation of user-supplied data to the NX-API subsystem. An attacker could exploit this vulnerability by sending a malicious HTTP or HTTPS packet to the management interface of an affected system that has the NX-API feature enabled. A successful exploit could allow the attacker to execute arbitrary commands with root privileges.
Note: NX-API is disabled by default.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-api-execution [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-api-execution”]
This advisory is part of the June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection, which includes 24 Cisco Security Advisories that describe 24 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection [“https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-67770”].
—–BEGIN PGP SIGNATURE—–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=Tybv
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com