var-201903-0555
Vulnerability from variot
A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5). This issue being tracked by Cisco Bug IDs CSCvh75886, CSCvh75949, CSCvi96549, CSCvi96551, CSCvi96554, CSCvi96559
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201903-0555", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "7.3\\(3\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "8.2" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "7.3" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "8.0" }, { "model": "firepower extensible operating system", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "2.3" }, { "model": "firepower extensible operating system", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "2.2.2.91" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(3\\)f1" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "7.2" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(25\\)" }, { "model": "firepower extensible operating system", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "2.3.1.110" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(3\\)i5" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(3\\)" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5\\)n1\\(1b\\)" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)a8\\(10\\)" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(3\\)i4\\(9\\)" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "7.3\\(3\\)d1\\(1\\)" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(22\\)" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "5.2." }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(3\\)i7\\(4\\)" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "8.1\\(1b\\)" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(3\\)f3" }, { "model": "nx-os", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(3\\)" }, { "model": "firepower extensible operating system", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "1.1" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(1\\)" }, { "model": "nx-os", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(3\\)f3\\(5\\)" }, { "model": "nx-os", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "fx-os", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.3" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.2" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.1" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.0" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.3" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.2" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.1" }, { "model": "nx-os 7.0 i7", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.0 i6", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.0 i5", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.0 i4", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.0 f3", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.0 f2", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.0 f1", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.0(3)" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.0" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.2" }, { "model": "nx-os 6.0 a8", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.0" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2" }, { "model": "nexus r-series line cards and fabric modules", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "95000" }, { "model": "nexus series switches in standalone nx-os mode", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "90000" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "77000" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "70000" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "60000" }, { "model": "nexus platform switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "56000" }, { "model": "nexus platform switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "55000" }, { "model": "nexus platform switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "36000" }, { "model": "nexus platform switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "35000" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "30000" }, { "model": "nexus series fabric extenders", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "20000" }, { "model": "mds series multilayer switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "90000" }, { "model": "nx-os", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "8.3(2)" }, { "model": "nx-os", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "8.2(3)" }, { "model": "nx-os 7.3 n1", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.1 n1", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.0 i7", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os 7.0 f3", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "6.2(27)" }, { "model": "nx-os", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "6.2(22)" }, { "model": "nx-os 6.0 a8", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "fxos", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "2.4.1.222" }, { "model": "fxos", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "2.3.1.110" }, { "model": "fxos", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "2.2.2.91" }, { "model": "fxos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "fxos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "fxos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "fxos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "fxos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "fxos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1" }, { "model": "firepower security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "93000" }, { "model": "firepower series next-generation firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "41000" } ], "sources": [ { "db": "BID", "id": "107399" }, { "db": "BID", "id": "107404" }, { "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "db": "NVD", "id": "CVE-2019-1600" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.2.91", "versionStartIncluding": "1.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.3.1.110", "versionStartIncluding": "2.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:firepower_4100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.3\\(1\\)", "versionStartIncluding": "8.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.0\\(3\\)i7\\(4\\)", "versionStartIncluding": "7.0\\(3\\)i5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.0\\(3\\)i7\\(4\\)", "versionStartIncluding": "7.0\\(3\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.0\\(3\\)f3\\(5\\)", "versionStartIncluding": "7.0\\(3\\)f3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.3\\(3\\)n1\\(1\\)", "versionStartIncluding": "7.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.2\\(3\\)", "versionStartIncluding": "8.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.0\\(3\\)i7\\(4\\)", "versionStartIncluding": "7.0\\(3\\)i5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.0\\(3\\)f3\\(5\\)", "versionStartIncluding": "7.0\\(3\\)f1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.1\\(1b\\)", "versionStartIncluding": "7.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.2\\(25\\)", "versionStartIncluding": "5.2.", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.0\\(3\\)i4\\(9\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.0\\(2\\)a8\\(10\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.1\\(5\\)n1\\(1b\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.3\\(3\\)d1\\(1\\)", "versionStartIncluding": "7.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.2\\(22\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.0\\(3\\)i4\\(9\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1600" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "107399" }, { "db": "BID", "id": "107404" }, { "db": "CNNVD", "id": "CNNVD-201903-185" } ], "trust": 1.2 }, "cve": "CVE-2019-1600", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-1600", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-148102", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.4, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-1600", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1600", "trust": 1.8, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1600", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201903-185", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-148102", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-148102" }, { "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "db": "NVD", "id": "CVE-2019-1600" }, { "db": "NVD", "id": "CVE-2019-1600" }, { "db": "CNNVD", "id": "CNNVD-201903-185" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5). \nThis issue being tracked by Cisco Bug IDs CSCvh75886, CSCvh75949, CSCvi96549, CSCvi96551, CSCvi96554, CSCvi96559", "sources": [ { "db": "NVD", "id": "CVE-2019-1600" }, { "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "db": "BID", "id": "107399" }, { "db": "BID", "id": "107404" }, { "db": "VULHUB", "id": "VHN-148102" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1600", "trust": 3.1 }, { "db": "BID", "id": "107399", "trust": 2.0 }, { "db": "BID", "id": "107404", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2019-002447", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201903-185", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-148102", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148102" }, { "db": "BID", "id": "107399" }, { "db": "BID", "id": "107404" }, { "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "db": "NVD", "id": "CVE-2019-1600" }, { "db": "CNNVD", "id": "CNNVD-201903-185" } ] }, "id": "VAR-201903-0555", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-148102" } ], "trust": 0.6396283214285714 }, "last_update_date": "2023-12-18T13:48:01.171000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190306-nxos-directory", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190306-nxos-directory" }, { "title": "Cisco FXOS Software and Cisco NX-OS Software Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=89856" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "db": "CNNVD", "id": "CNNVD-201903-185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-732", "trust": 1.1 }, { "problemtype": "CWE-200", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148102" }, { "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "db": "NVD", "id": "CVE-2019-1600" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190306-nxos-directory" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/107399" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1600" }, { "trust": 1.2, "url": "http://www.cisco.com/en/us/products/ps9494/products_sub_category_home.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/107404" }, { "trust": 0.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190306-nxos-file-access" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1600" }, { "trust": 0.6, "url": "http://www.cisco.com/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-nx-os-nexus-multiple-vulnerabilities-28681" } ], "sources": [ { "db": "VULHUB", "id": "VHN-148102" }, { "db": "BID", "id": "107399" }, { "db": "BID", "id": "107404" }, { "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "db": "NVD", "id": "CVE-2019-1600" }, { "db": "CNNVD", "id": "CNNVD-201903-185" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-148102" }, { "db": "BID", "id": "107399" }, { "db": "BID", "id": "107404" }, { "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "db": "NVD", "id": "CVE-2019-1600" }, { "db": "CNNVD", "id": "CNNVD-201903-185" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-07T00:00:00", "db": "VULHUB", "id": "VHN-148102" }, { "date": "2019-03-06T00:00:00", "db": "BID", "id": "107399" }, { "date": "2019-03-06T00:00:00", "db": "BID", "id": "107404" }, { "date": "2019-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "date": "2019-03-07T20:29:00.343000", "db": "NVD", "id": "CVE-2019-1600" }, { "date": "2019-03-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201903-185" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-10T00:00:00", "db": "VULHUB", "id": "VHN-148102" }, { "date": "2019-03-06T00:00:00", "db": "BID", "id": "107399" }, { "date": "2019-03-06T00:00:00", "db": "BID", "id": "107404" }, { "date": "2019-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002447" }, { "date": "2023-04-20T15:27:48.130000", "db": "NVD", "id": "CVE-2019-1600" }, { "date": "2019-04-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201903-185" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "107399" }, { "db": "BID", "id": "107404" }, { "db": "CNNVD", "id": "CNNVD-201903-185" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco FXOS and NX-OS Information disclosure vulnerability in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002447" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Access Validation Error", "sources": [ { "db": "BID", "id": "107399" }, { "db": "BID", "id": "107404" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.