cve-2024-20413
Vulnerability from cvelistv5
Published
2024-08-28 16:27
Modified
2024-08-30 03:56
Severity ?
EPSS score ?
Summary
Cisco NX-OS Bash Privilege Escalation Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco NX-OS Software |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(3y\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(1t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(6z\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(3z\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im7\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)ic4\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8z\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(10a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(1z\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(6t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)ia7\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)ia7\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(10a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(5w\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7k\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(9w\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(1q\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.1\\(2t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3v\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(99w\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3w\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(99x\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3o\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3p\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.4\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3q\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3x\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(4g\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3r\\):*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nx-os", "vendor": "cisco", "versions": [ { "status": "affected", "version": "9.2\\(3\\)" }, { "status": "affected", "version": "7.0\\(3\\)i5\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(7a\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(5\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(6\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(3\\)" }, { "status": "affected", "version": "9.2\\(2v\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(5b\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(7\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(1a\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(8\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)im3\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(5a\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(11\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(4a\\)" }, { "status": "affected", "version": "9.2\\(1\\)" }, { "status": "affected", "version": "9.2\\(2t\\)" }, { "status": "affected", "version": "9.2\\(3y\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(1t\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(5c\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(4\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(6z\\)" }, { "status": "affected", "version": "9.3\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)f3\\(3\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(6\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(3z\\)" }, { "status": "affected", "version": "7.0\\(3\\)im7\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(11b\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(5a\\)" }, { "status": "affected", "version": "7.0\\(3\\)i6\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(10\\)" }, { "status": "affected", "version": "7.0\\(3\\)im3\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(8\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)i5\\(3b\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(2a\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(7\\)" }, { "status": "affected", "version": "9.2\\(4\\)" }, { "status": "affected", "version": "7.0\\(3\\)im3\\(2a\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(10\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)ic4\\(4\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(3\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(5b\\)" }, { "status": "affected", "version": "7.0\\(3\\)f3\\(3c\\)" }, { "status": "affected", "version": "7.0\\(3\\)f3\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(5\\)" }, { "status": "affected", "version": "7.0\\(3\\)f3\\(5\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(7\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(5\\)" }, { "status": "affected", "version": "7.0\\(3\\)im3\\(2b\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(4a\\)" }, { "status": "affected", "version": "7.0\\(3\\)i5\\(3\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(3\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(6\\)" }, { "status": "affected", "version": "7.0\\(3\\)i6\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(5\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(8\\)" }, { "status": "affected", "version": "7.0\\(3\\)im3\\(3\\)" }, { "status": "affected", "version": "9.3\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(7\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(6\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(3a\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(11a\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(8z\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(9\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(4\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(7\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(9\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(6\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(10a\\)" }, { "status": "affected", "version": "7.0\\(3\\)i5\\(1\\)" }, { "status": "affected", "version": "9.3\\(1z\\)" }, { "status": "affected", "version": "9.2\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)f3\\(4\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(8b\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(3\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(6t\\)" }, { "status": "affected", "version": "7.0\\(3\\)i5\\(3a\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(8\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(5\\)" }, { "status": "affected", "version": "7.0\\(3\\)f3\\(3a\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(4\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(3a\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(5a\\)" }, { "status": "affected", "version": "7.0\\(3\\)f2\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(8a\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(9\\)" }, { "status": "affected", "version": "7.0\\(3\\)f3\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(2a\\)" }, { "status": "affected", "version": "7.0\\(3\\)i4\\(4\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(3\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)f2\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)ia7\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)ia7\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(7b\\)" }, { "status": "affected", "version": "7.0\\(3\\)f1\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(1a\\)" }, { "status": "affected", "version": "6.0\\(2\\)a6\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)a8\\(4a\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(4\\)" }, { "status": "affected", "version": "9.3\\(3\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(8\\)" }, { "status": "affected", "version": "6.0\\(2\\)u6\\(10a\\)" }, { "status": "affected", "version": "9.3\\(4\\)" }, { "status": "affected", "version": "9.3\\(5\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(9\\)" }, { "status": "affected", "version": "9.3\\(6\\)" }, { "status": "affected", "version": "10.1\\(2\\)" }, { "status": "affected", "version": "10.1\\(1\\)" }, { "status": "affected", "version": "9.3\\(5w\\)" }, { "status": "affected", "version": "9.3\\(7\\)" }, { "status": "affected", "version": "9.3\\(7k\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(9w\\)" }, { "status": "affected", "version": "10.2\\(1\\)" }, { "status": "affected", "version": "9.3\\(7a\\)" }, { "status": "affected", "version": "9.3\\(8\\)" }, { "status": "affected", "version": "7.0\\(3\\)i7\\(10\\)" }, { "status": "affected", "version": "10.2\\(1q\\)" }, { "status": "affected", "version": "10.2\\(2\\)" }, { "status": "affected", "version": "9.3\\(9\\)" }, { "status": "affected", "version": "10.1\\(2t\\)" }, { "status": "affected", "version": "10.2\\(3\\)" }, { "status": "affected", "version": "10.2\\(3t\\)" }, { "status": "affected", "version": "9.3\\(10\\)" }, { "status": "affected", "version": "10.2\\(2a\\)" }, { "status": "affected", "version": "10.3\\(1\\)" }, { "status": "affected", "version": "10.2\\(4\\)" }, { "status": "affected", "version": "10.3\\(2\\)" }, { "status": "affected", "version": "9.3\\(11\\)" }, { "status": "affected", "version": "10.3\\(3\\)" }, { "status": "affected", "version": "10.2\\(5\\)" }, { "status": "affected", "version": "9.3\\(12\\)" }, { "status": "affected", "version": "10.2\\(3v\\)" }, { "status": "affected", "version": "10.4\\(1\\)" }, { "status": "affected", "version": "10.3\\(99w\\)" }, { "status": "affected", "version": "10.2\\(6\\)" }, { "status": "affected", "version": "10.3\\(3w\\)" }, { "status": "affected", "version": "10.3\\(99x\\)" }, { "status": "affected", "version": "10.3\\(3o\\)" }, { "status": "affected", "version": "10.3\\(4\\)" }, { "status": "affected", "version": "10.3\\(3p\\)" }, { "status": "affected", "version": "10.3\\(4a\\)" }, { "status": "affected", "version": "10.4\\(2\\)" }, { "status": "affected", "version": "10.3\\(3q\\)" }, { "status": "affected", "version": "9.3\\(13\\)" }, { "status": "affected", "version": "10.2\\(7\\)" }, { "status": "affected", "version": "10.3\\(3x\\)" }, { "status": "affected", "version": "10.3\\(4g\\)" }, { "status": "affected", "version": "10.3\\(3r\\)" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20413", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-30T03:56:03.888Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco NX-OS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.2(3)" }, { "status": "affected", "version": "7.0(3)I5(2)" }, { "status": "affected", "version": "6.0(2)A8(7a)" }, { "status": "affected", "version": "7.0(3)I4(5)" }, { "status": "affected", "version": "6.0(2)A6(1)" }, { "status": "affected", "version": "7.0(3)I4(6)" }, { "status": "affected", "version": "7.0(3)I4(3)" }, { "status": "affected", "version": "9.2(2v)" }, { "status": "affected", "version": "6.0(2)A6(5b)" }, { "status": "affected", "version": "7.0(3)I4(7)" }, { "status": "affected", "version": "6.0(2)U6(1a)" }, { "status": "affected", "version": "7.0(3)I4(1)" }, { "status": "affected", "version": "7.0(3)I4(8)" }, { "status": "affected", "version": "7.0(3)I4(2)" }, { "status": "affected", "version": "7.0(3)IM3(1)" }, { "status": "affected", "version": "6.0(2)U6(5a)" }, { "status": "affected", "version": "6.0(2)A8(11)" }, { "status": "affected", "version": "6.0(2)A6(4a)" }, { "status": "affected", "version": "9.2(1)" }, { "status": "affected", "version": "9.2(2t)" }, { "status": "affected", "version": "9.2(3y)" }, { "status": "affected", "version": "7.0(3)I4(1t)" }, { "status": "affected", "version": "6.0(2)U6(5c)" }, { "status": "affected", "version": "6.0(2)A6(4)" }, { "status": "affected", "version": "7.0(3)I7(6z)" }, { "status": "affected", "version": "9.3(2)" }, { "status": "affected", "version": "7.0(3)F3(3)" }, { "status": "affected", "version": "6.0(2)U6(6)" }, { "status": "affected", "version": "7.0(3)I7(3z)" }, { "status": "affected", "version": "7.0(3)IM7(2)" }, { "status": "affected", "version": "6.0(2)A8(11b)" }, { "status": "affected", "version": "7.0(3)I7(5a)" }, { "status": "affected", "version": "7.0(3)I6(1)" }, { "status": "affected", "version": "6.0(2)U6(10)" }, { "status": "affected", "version": "7.0(3)IM3(2)" }, { "status": "affected", "version": "6.0(2)A6(8)" }, { "status": "affected", "version": "6.0(2)U6(1)" }, { "status": "affected", "version": "7.0(3)I5(3b)" }, { "status": "affected", "version": "6.0(2)A6(2a)" }, { "status": "affected", "version": "6.0(2)U6(7)" }, { "status": "affected", "version": "9.2(4)" }, { "status": "affected", "version": "7.0(3)IM3(2a)" }, { "status": "affected", "version": "6.0(2)A8(10)" }, { "status": "affected", "version": "6.0(2)A8(2)" }, { "status": "affected", "version": "7.0(3)IC4(4)" }, { "status": "affected", "version": "6.0(2)A6(3)" }, { "status": "affected", "version": "6.0(2)U6(5b)" }, { "status": "affected", "version": "7.0(3)F3(3c)" }, { "status": "affected", "version": "7.0(3)F3(1)" }, { "status": "affected", "version": "6.0(2)U6(5)" }, { "status": "affected", "version": "7.0(3)F3(5)" }, { "status": "affected", "version": "6.0(2)A6(7)" }, { "status": "affected", "version": "7.0(3)I7(2)" }, { "status": "affected", "version": "6.0(2)A6(5)" }, { "status": "affected", "version": "7.0(3)IM3(2b)" }, { "status": "affected", "version": "6.0(2)U6(4a)" }, { "status": "affected", "version": "7.0(3)I5(3)" }, { "status": "affected", "version": "7.0(3)I7(3)" }, { "status": "affected", "version": "6.0(2)A8(6)" }, { "status": "affected", "version": "7.0(3)I6(2)" }, { "status": "affected", "version": "6.0(2)A8(5)" }, { "status": "affected", "version": "6.0(2)U6(8)" }, { "status": "affected", "version": "7.0(3)IM3(3)" }, { "status": "affected", "version": "9.3(1)" }, { "status": "affected", "version": "6.0(2)U6(2)" }, { "status": "affected", "version": "6.0(2)A8(7)" }, { "status": "affected", "version": "7.0(3)I7(6)" }, { "status": "affected", "version": "6.0(2)U6(3a)" }, { "status": "affected", "version": "6.0(2)A8(11a)" }, { "status": "affected", "version": "7.0(3)I4(8z)" }, { "status": "affected", "version": "7.0(3)I4(9)" }, { "status": "affected", "version": "7.0(3)I7(4)" }, { "status": "affected", "version": "7.0(3)I7(7)" }, { "status": "affected", "version": "6.0(2)A8(9)" }, { "status": "affected", "version": "6.0(2)A8(1)" }, { "status": "affected", "version": "6.0(2)A6(6)" }, { "status": "affected", "version": "6.0(2)A8(10a)" }, { "status": "affected", "version": "7.0(3)I5(1)" }, { "status": "affected", "version": "9.3(1z)" }, { "status": "affected", "version": "9.2(2)" }, { "status": "affected", "version": "7.0(3)F3(4)" }, { "status": "affected", "version": "7.0(3)I4(8b)" }, { "status": "affected", "version": "6.0(2)A8(3)" }, { "status": "affected", "version": "7.0(3)I4(6t)" }, { "status": "affected", "version": "7.0(3)I5(3a)" }, { "status": "affected", "version": "6.0(2)A8(8)" }, { "status": "affected", "version": "7.0(3)I7(5)" }, { "status": "affected", "version": "7.0(3)F3(3a)" }, { "status": "affected", "version": "6.0(2)A8(4)" }, { "status": "affected", "version": "6.0(2)A6(3a)" }, { "status": "affected", "version": "6.0(2)A6(5a)" }, { "status": "affected", "version": "7.0(3)F2(1)" }, { "status": "affected", "version": "7.0(3)I4(8a)" }, { "status": "affected", "version": "6.0(2)U6(9)" }, { "status": "affected", "version": "7.0(3)F3(2)" }, { "status": "affected", "version": "6.0(2)U6(2a)" }, { "status": "affected", "version": "7.0(3)I4(4)" }, { "status": "affected", "version": "6.0(2)U6(3)" }, { "status": "affected", "version": "7.0(3)I7(1)" }, { "status": "affected", "version": "7.0(3)F2(2)" }, { "status": "affected", "version": "7.0(3)IA7(2)" }, { "status": "affected", "version": "7.0(3)IA7(1)" }, { "status": "affected", "version": "6.0(2)A8(7b)" }, { "status": "affected", "version": "7.0(3)F1(1)" }, { "status": "affected", "version": "6.0(2)A6(1a)" }, { "status": "affected", "version": "6.0(2)A6(2)" }, { "status": "affected", "version": "6.0(2)A8(4a)" }, { "status": "affected", "version": "6.0(2)U6(4)" }, { "status": "affected", "version": "9.3(3)" }, { "status": "affected", "version": "7.0(3)I7(8)" }, { "status": "affected", "version": "6.0(2)U6(10a)" }, { "status": "affected", "version": "9.3(4)" }, { "status": "affected", "version": "9.3(5)" }, { "status": "affected", "version": "7.0(3)I7(9)" }, { "status": "affected", "version": "9.3(6)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "9.3(5w)" }, { "status": "affected", "version": "9.3(7)" }, { "status": "affected", "version": "9.3(7k)" }, { "status": "affected", "version": "7.0(3)I7(9w)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "9.3(7a)" }, { "status": "affected", "version": "9.3(8)" }, { "status": "affected", "version": "7.0(3)I7(10)" }, { "status": "affected", "version": "10.2(1q)" }, { "status": "affected", "version": "10.2(2)" }, { "status": "affected", "version": "9.3(9)" }, { "status": "affected", "version": "10.1(2t)" }, { "status": "affected", "version": "10.2(3)" }, { "status": "affected", "version": "10.2(3t)" }, { "status": "affected", "version": "9.3(10)" }, { "status": "affected", "version": "10.2(2a)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.2(4)" }, { "status": "affected", "version": "10.3(2)" }, { "status": "affected", "version": "9.3(11)" }, { "status": "affected", "version": "10.3(3)" }, { "status": "affected", "version": "10.2(5)" }, { "status": "affected", "version": "9.3(12)" }, { "status": "affected", "version": "10.2(3v)" }, { "status": "affected", "version": "10.4(1)" }, { "status": "affected", "version": "10.3(99w)" }, { "status": "affected", "version": "10.2(6)" }, { "status": "affected", "version": "10.3(3w)" }, { "status": "affected", "version": "10.3(99x)" }, { "status": "affected", "version": "10.3(3o)" }, { "status": "affected", "version": "10.3(4)" }, { "status": "affected", "version": "10.3(3p)" }, { "status": "affected", "version": "10.3(4a)" }, { "status": "affected", "version": "10.4(2)" }, { "status": "affected", "version": "10.3(3q)" }, { "status": "affected", "version": "9.3(13)" }, { "status": "affected", "version": "10.3(5)" }, { "status": "affected", "version": "10.2(7)" }, { "status": "affected", "version": "10.4(3)" }, { "status": "affected", "version": "10.3(3x)" }, { "status": "affected", "version": "10.3(4g)" }, { "status": "affected", "version": "10.3(3r)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to elevate privileges to network-admin on an affected device.\r\n\r\nThis vulnerability is due to insufficient security restrictions when executing application arguments from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to create new users with the privileges of network-admin." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "Missing Authorization", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-28T16:27:29.365Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-nxos-bshacepe-bApeHSx7", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7" } ], "source": { "advisory": "cisco-sa-nxos-bshacepe-bApeHSx7", "defects": [ "CSCwh77783" ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Bash Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20413", "datePublished": "2024-08-28T16:27:29.365Z", "dateReserved": "2023-11-08T15:08:07.663Z", "dateUpdated": "2024-08-30T03:56:03.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-20413\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-08-28T17:15:09.763\",\"lastModified\":\"2024-08-29T13:25:27.537\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to elevate privileges to network-admin on an affected device.\\r\\n\\r\\nThis vulnerability is due to insufficient security restrictions when executing application arguments from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to create new users with the privileges of network-admin.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el software Cisco NX-OS podr\u00eda permitir que un atacante local autenticado con privilegios acceda al shell Bash para elevar los privilegios a administrador de red en un dispositivo afectado. Esta vulnerabilidad se debe a restricciones de seguridad insuficientes al ejecutar argumentos de aplicaci\u00f3n desde el shell Bash. Un atacante con privilegios para acceder al shell Bash podr\u00eda aprovechar esta vulnerabilidad ejecutando comandos dise\u00f1ados en el sistema operativo subyacente. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante crear nuevos usuarios con los privilegios de administrador de red.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7\",\"source\":\"ykramarz@cisco.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.