Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CNVD-2019-06597
Vulnerability from cnvd - Published: 2019-03-07
VLAI Severity ?
Title
Cisco FXOS和NX-OS未经授权目录访问漏洞
Description
Cisco FXOS是Firepower可扩展操作系统。Cisco NX-OS是适用于思科Nexus系列以太网交换机和MDS系列光纤通道存储区域网络交换机的网络操作系统。
Cisco FXOS和NX-OS的文件系统权限存在未经授权目录访问漏洞。该漏洞源于文件系统权限未能正确实现。本地认证攻击者可利用该漏洞访问存储在受影响系统的文件系统中的敏感信息。
Severity
中
Patch Name
Cisco FXOS和NX-OS未经授权目录访问漏洞的补丁
Patch Description
Cisco FXOS是Firepower可扩展操作系统。Cisco NX-OS是适用于思科Nexus系列以太网交换机和MDS系列光纤通道存储区域网络交换机的网络操作系统。
Cisco FXOS和NX-OS的文件系统权限存在未经授权目录访问漏洞。该漏洞源于文件系统权限未能正确实现。本地认证攻击者可利用该漏洞访问存储在受影响系统的文件系统中的敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布漏洞修复程序,请及时关注更新:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory
Reference
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory
Impacted products
| Name | ['Cisco NX-OS 无', 'Cisco FXOS 无'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-1600"
}
},
"description": "Cisco FXOS\u662fFirepower\u53ef\u6269\u5c55\u64cd\u4f5c\u7cfb\u7edf\u3002Cisco NX-OS\u662f\u9002\u7528\u4e8e\u601d\u79d1Nexus\u7cfb\u5217\u4ee5\u592a\u7f51\u4ea4\u6362\u673a\u548cMDS\u7cfb\u5217\u5149\u7ea4\u901a\u9053\u5b58\u50a8\u533a\u57df\u7f51\u7edc\u4ea4\u6362\u673a\u7684\u7f51\u7edc\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nCisco FXOS\u548cNX-OS\u7684\u6587\u4ef6\u7cfb\u7edf\u6743\u9650\u5b58\u5728\u672a\u7ecf\u6388\u6743\u76ee\u5f55\u8bbf\u95ee\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u6587\u4ef6\u7cfb\u7edf\u6743\u9650\u672a\u80fd\u6b63\u786e\u5b9e\u73b0\u3002\u672c\u5730\u8ba4\u8bc1\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95ee\u5b58\u50a8\u5728\u53d7\u5f71\u54cd\u7cfb\u7edf\u7684\u6587\u4ef6\u7cfb\u7edf\u4e2d\u7684\u654f\u611f\u4fe1\u606f\u3002",
"discovererName": "Unknown",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1ahttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-06597",
"openTime": "2019-03-07",
"patchDescription": "Cisco FXOS\u662fFirepower\u53ef\u6269\u5c55\u64cd\u4f5c\u7cfb\u7edf\u3002Cisco NX-OS\u662f\u9002\u7528\u4e8e\u601d\u79d1Nexus\u7cfb\u5217\u4ee5\u592a\u7f51\u4ea4\u6362\u673a\u548cMDS\u7cfb\u5217\u5149\u7ea4\u901a\u9053\u5b58\u50a8\u533a\u57df\u7f51\u7edc\u4ea4\u6362\u673a\u7684\u7f51\u7edc\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco FXOS\u548cNX-OS\u7684\u6587\u4ef6\u7cfb\u7edf\u6743\u9650\u5b58\u5728\u672a\u7ecf\u6388\u6743\u76ee\u5f55\u8bbf\u95ee\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u6587\u4ef6\u7cfb\u7edf\u6743\u9650\u672a\u80fd\u6b63\u786e\u5b9e\u73b0\u3002\u672c\u5730\u8ba4\u8bc1\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95ee\u5b58\u50a8\u5728\u53d7\u5f71\u54cd\u7cfb\u7edf\u7684\u6587\u4ef6\u7cfb\u7edf\u4e2d\u7684\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco FXOS\u548cNX-OS\u672a\u7ecf\u6388\u6743\u76ee\u5f55\u8bbf\u95ee\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco NX-OS \u65e0",
"Cisco FXOS \u65e0"
]
},
"referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory",
"serverity": "\u4e2d",
"submitTime": "2019-03-08",
"title": "Cisco FXOS\u548cNX-OS\u672a\u7ecf\u6388\u6743\u76ee\u5f55\u8bbf\u95ee\u6f0f\u6d1e"
}
CVE-2019-1600 (GCVE-0-2019-1600)
Vulnerability from cvelistv5 – Published: 2019-03-07 20:00 – Updated: 2024-11-20 17:26
VLAI?
EPSS
Summary
A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).
Severity ?
6.7 (Medium)
CWE
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Firepower 4100 Series Next-Generation Firewalls |
Affected:
unspecified , < 2.2.2.91
(custom)
Affected: unspecified , < 2.3.1.110 (custom) |
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:20:28.424Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "107399",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/107399"
},
{
"name": "20190306 Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory"
},
{
"name": "107404",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/107404"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-1600",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-20T16:55:46.371130Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-20T17:26:53.055Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Firepower 4100 Series Next-Generation Firewalls",
"vendor": "Cisco",
"versions": [
{
"lessThan": "2.2.2.91",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "2.3.1.110",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firepower 9300 Series Next-Generation Firewalls",
"vendor": "Cisco",
"versions": [
{
"lessThan": "2.2.2.91",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "2.3.1.110",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "MDS 9000 Series Multilayer Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "6.2(25)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "8.1(1b)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "8.3(1)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Nexus 3000 Series Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "7.0(3)I4(9)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "7.0(3)I7(4)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Nexus 3500 Platform Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "6.0(2)A8(10)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "7.0(3)I7(4)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Nexus 3600 Platform Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "7.0(3)F3(5)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Nexus 2000, 5500, 5600, and 6000 Series Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "7.1(5)N1(1b)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "7.3(3)N1(1)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Nexus 7000 and 7700 Series Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "6.2(22)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "7.3(3)D1(1)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "8.2(3)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Nexus 9000 Series Switches-Standalone",
"vendor": "Cisco",
"versions": [
{
"lessThan": "7.0(3)I4(9)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "7.0(3)I7(4)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Nexus 9500 R-Series Line Cards and Fabric Modules",
"vendor": "Cisco",
"versions": [
{
"lessThan": "7.0(3)F3(5)",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-03-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-264",
"description": "CWE-264",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-03-15T09:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "107399",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/107399"
},
{
"name": "20190306 Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory"
},
{
"name": "107404",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/107404"
}
],
"source": {
"advisory": "cisco-sa-20190306-nxos-directory",
"defect": [
[
"CSCvh75886",
"CSCvh75949",
"CSCvi96549",
"CSCvi96551",
"CSCvi96554",
"CSCvi96559"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-03-06T16:00:00-0800",
"ID": "CVE-2019-1600",
"STATE": "PUBLIC",
"TITLE": "Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firepower 4100 Series Next-Generation Firewalls",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "2.2.2.91"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "2.3.1.110"
}
]
}
},
{
"product_name": "Firepower 9300 Series Next-Generation Firewalls",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "2.2.2.91"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "2.3.1.110"
}
]
}
},
{
"product_name": "MDS 9000 Series Multilayer Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "6.2(25)"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "8.1(1b)"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "8.3(1)"
}
]
}
},
{
"product_name": "Nexus 3000 Series Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.0(3)I4(9)"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.0(3)I7(4)"
}
]
}
},
{
"product_name": "Nexus 3500 Platform Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "6.0(2)A8(10)"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.0(3)I7(4)"
}
]
}
},
{
"product_name": "Nexus 3600 Platform Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.0(3)F3(5)"
}
]
}
},
{
"product_name": "Nexus 2000, 5500, 5600, and 6000 Series Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.1(5)N1(1b)"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.3(3)N1(1)"
}
]
}
},
{
"product_name": "Nexus 7000 and 7700 Series Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "6.2(22)"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.3(3)D1(1)"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "8.2(3)"
}
]
}
},
{
"product_name": "Nexus 9000 Series Switches-Standalone",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.0(3)I4(9)"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.0(3)I7(4)"
}
]
}
},
{
"product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "7.0(3)F3(5)"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "107399",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107399"
},
{
"name": "20190306 Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory"
},
{
"name": "107404",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107404"
}
]
},
"source": {
"advisory": "cisco-sa-20190306-nxos-directory",
"defect": [
[
"CSCvh75886",
"CSCvh75949",
"CSCvi96549",
"CSCvi96551",
"CSCvi96554",
"CSCvi96559"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-1600",
"datePublished": "2019-03-07T20:00:00Z",
"dateReserved": "2018-12-06T00:00:00",
"dateUpdated": "2024-11-20T17:26:53.055Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…