CVE-2015-4232
Published Jul 3, 2015
Last updated 8 years ago
Overview
- Description
- Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED7B1216-4C4F-4A23-9474-23876649ABF3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662" }, { "criteria": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B25B92ED-37C0-4653-9C5E-B4C13C46464C" }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC" }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271" }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3" }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A" }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D" }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334" }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF" }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F" }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD" }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A" }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1" }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6" }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A" } ], "operator": "OR" } ], "operator": "AND" } ]