CVE-2017-6649
Published May 22, 2017
Last updated 5 years ago
Overview
- Description
- A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A20D72B-E2C6-47B6-A54D-FA435F29D7F2" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77D9EEFA-D652-45D2-8AF5-8A72825E7ED0" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AEB91EC-E548-4C53-920F-C4871BC464B8" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0282F963-2C1F-44F7-A0D0-4929685051AA" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2.1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C97083C8-89AE-4D0D-A039-1B798D60B573" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(3.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "768151A3-CCF6-4F37-877F-4F1F2CD60791" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9103A92E-C9F3-401B-AE30-66466210ADED" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)d1\\(0.437\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B917BAB-61B4-4596-B409-E9D8CBB3A904" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E485E99D-F421-487D-86E7-A2D119623D47" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)zz\\(99.1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E2E6964-B258-42D4-8181-BB4765B58AE5" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94AA886F-7BD1-4699-B1D3-E495EFCA2812" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "569B3CE7-CA06-4636-8043-7ED7635195A3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4" }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78" }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85" }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB" }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0" }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8" }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457" }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "367C2A49-4C4D-471B-9B34-AFAFA5AE9503" }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B" } ], "operator": "OR" } ], "operator": "AND" } ]