CVE-2017-6649 (GCVE-0-2017-6649)

Vulnerability from cvelistv5 – Published: 2017-05-22 01:00 – Updated: 2024-08-05 15:33
VLAI?
Summary
A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.
Severity ?
No CVSS data available.
CWE
Assigner
References
Impacted products
Vendor Product Version
n/a Cisco Nexus Series Switches Affected: Cisco Nexus Series Switches
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:33:20.460Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1038518",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038518"
          },
          {
            "name": "98531",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98531"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Nexus Series Switches",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco Nexus Series Switches"
            }
          ]
        }
      ],
      "datePublic": "2017-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user\u0027s privilege level outside of the user\u0027s path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-17T20:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1038518",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038518"
        },
        {
          "name": "98531",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98531"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2017-6649",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Nexus Series Switches",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco Nexus Series Switches"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user\u0027s privilege level outside of the user\u0027s path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1038518",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038518"
            },
            {
              "name": "98531",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98531"
            },
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2017-6649",
    "datePublished": "2017-05-22T01:00:00",
    "dateReserved": "2017-03-09T00:00:00",
    "dateUpdated": "2024-08-05T15:33:20.460Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.1\\\\(1\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A20D72B-E2C6-47B6-A54D-FA435F29D7F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.1\\\\(2\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77D9EEFA-D652-45D2-8AF5-8A72825E7ED0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.1\\\\(3\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AEB91EC-E548-4C53-920F-C4871BC464B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.1\\\\(3\\\\)n1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0282F963-2C1F-44F7-A0D0-4929685051AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.1\\\\(3\\\\)n1\\\\(2.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C97083C8-89AE-4D0D-A039-1B798D60B573\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.1\\\\(3\\\\)n1\\\\(3.12\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"768151A3-CCF6-4F37-877F-4F1F2CD60791\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.1\\\\(4\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9103A92E-C9F3-401B-AE30-66466210ADED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.2\\\\(0\\\\)d1\\\\(0.437\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B917BAB-61B4-4596-B409-E9D8CBB3A904\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.2\\\\(0\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E485E99D-F421-487D-86E7-A2D119623D47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.2\\\\(0\\\\)zz\\\\(99.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E2E6964-B258-42D4-8181-BB4765B58AE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.2\\\\(1\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94AA886F-7BD1-4699-B1D3-E495EFCA2812\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.3\\\\(0\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"569B3CE7-CA06-4636-8043-7ED7635195A3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1766443C-1C5A-486E-A36F-D3045F364D78\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABB6E612-4246-4408-B3F6-B31E771F5ACB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91B129B2-2B31-4DE0-9F83-CC6E0C8729A0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CBD3CD0-B542-4B23-9C9D-061643BE44E8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A22A2647-A4C0-4681-BBC5-D95ADBAA0457\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"367C2A49-4C4D-471B-9B34-AFAFA5AE9503\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user\u0027s privilege level outside of the user\u0027s path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la l\\u00ednea de comando de Cisco-OS System Software 7.1 hasta la 7.3 ejecut\\u00e1ndose en Cisco Nexus Series Switches puede permitir a un usuario local autenticado que realice un ataque de inyecci\\u00f3n de comandos. Esta vulnerabilidad es debida a la falta de validaci\\u00f3n de la entrada de los argumentos del comando. Un atacante podr\\u00eda explotar esta vulnerabilidad mediante la inyecci\\u00f3n de los argumentos del comando manipulados en la l\\u00ednea de comandos vulnerable. Un exploit podr\\u00eda permitir al atacante leer o escribir archivos aleatorios con privilegios de usuario fuera de la ruta del usuario. Bug IDs: CSCvb86787, CSCve60516, CSCve60555.\"}]",
      "id": "CVE-2017-6649",
      "lastModified": "2024-11-21T03:30:13.183",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2017-05-22T01:29:00.760",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/98531\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038518\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/98531\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038518\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}, {\"lang\": \"en\", \"value\": \"CWE-77\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-6649\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2017-05-22T01:29:00.760\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user\u0027s privilege level outside of the user\u0027s path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la l\u00ednea de comando de Cisco-OS System Software 7.1 hasta la 7.3 ejecut\u00e1ndose en Cisco Nexus Series Switches puede permitir a un usuario local autenticado que realice un ataque de inyecci\u00f3n de comandos. Esta vulnerabilidad es debida a la falta de validaci\u00f3n de la entrada de los argumentos del comando. Un atacante podr\u00eda explotar esta vulnerabilidad mediante la inyecci\u00f3n de los argumentos del comando manipulados en la l\u00ednea de comandos vulnerable. Un exploit podr\u00eda permitir al atacante leer o escribir archivos aleatorios con privilegios de usuario fuera de la ruta del usuario. Bug IDs: CSCvb86787, CSCve60516, CSCve60555.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.1\\\\(1\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A20D72B-E2C6-47B6-A54D-FA435F29D7F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.1\\\\(2\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D9EEFA-D652-45D2-8AF5-8A72825E7ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.1\\\\(3\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AEB91EC-E548-4C53-920F-C4871BC464B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.1\\\\(3\\\\)n1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0282F963-2C1F-44F7-A0D0-4929685051AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.1\\\\(3\\\\)n1\\\\(2.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C97083C8-89AE-4D0D-A039-1B798D60B573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.1\\\\(3\\\\)n1\\\\(3.12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768151A3-CCF6-4F37-877F-4F1F2CD60791\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.1\\\\(4\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9103A92E-C9F3-401B-AE30-66466210ADED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.2\\\\(0\\\\)d1\\\\(0.437\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B917BAB-61B4-4596-B409-E9D8CBB3A904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.2\\\\(0\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E485E99D-F421-487D-86E7-A2D119623D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.2\\\\(0\\\\)zz\\\\(99.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E2E6964-B258-42D4-8181-BB4765B58AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.2\\\\(1\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AA886F-7BD1-4699-B1D3-E495EFCA2812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.3\\\\(0\\\\)n1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569B3CE7-CA06-4636-8043-7ED7635195A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1766443C-1C5A-486E-A36F-D3045F364D78\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB6E612-4246-4408-B3F6-B31E771F5ACB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B129B2-2B31-4DE0-9F83-CC6E0C8729A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBD3CD0-B542-4B23-9C9D-061643BE44E8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22A2647-A4C0-4681-BBC5-D95ADBAA0457\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"367C2A49-4C4D-471B-9B34-AFAFA5AE9503\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/98531\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038518\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/98531\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038518\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…