CVE-2019-12717 (CNNVD-201909-1140)

MEDIUM
中文标题:
Cisco NX-OS Software 操作系统命令注入漏洞
英文标题:
Cisco NX-OS Software Virtualization Manager Command Injection Vulnerability
CVSS分数: 6.7
发布时间: 2019-09-25 20:16:02
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Nexus 3000 Series Switches等都是美国思科(Cisco)公司的产品。Cisco Nexus 3000 Series Switches是一款3000系列交换机。Cisco Nexus 3500 Platform Switches是一款3500系列平台交换机。Cisco Nexus 3600 Platform Switches是一款3600系列平台交换机。Cisco NX-OS Software是一套交换机使用的数据中心级操作系统软件。 Cisco NX-OS Software中与virtualization manager有关的命令存在操作系统命令注入漏洞,该漏洞源于程序没有充分验证传入到VMAN CLI命令的参数。本地攻击者可利用该漏洞以root权限在底层Linux操作系统上执行任意命令。以下产品及版本受到影响:Cisco Nexus 3000 Series Switches;Nexus 3500 Platform Switches;Nexus 3600 Platform Switches;Nexus 5500 Platform Switches;Nexus 5600 Platform Switches;Nexus 6000 Series Switches;Nexus 7000 Series Switches;Nexus 7700 Series Switches;Nexus 9000 Series Switches in standalone NX-OS mode;Nexus 9500 R-Series Switching Platform。

英文描述:

A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges, which may lead to complete system compromise. An attacker would need valid administrator credentials to exploit this vulnerability.

CWE类型:
CWE-78
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Cisco Cisco NX-OS Software 5.0(3)A1(1) - < n/a - cpe:2.3:a:cisco:cisco_nx-os_software_5.0(3)a1(1):*:*:*:*:*:*:*:*
cisco nx-os * - - cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20190925 Cisco NX-OS Software Virtualization Manager Command Injection Vulnerability vendor-advisory
cve.org
访问
CVSS评分详情
3.0 (cna)
MEDIUM
6.7
CVSS向量: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2019-09-25 20:16:02
修改时间:
2024-11-20 17:09:14
创建时间:
2025-11-11 15:35:31
更新时间:
2025-11-11 15:54:52
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2019-12717 2025-11-11 15:20:00 2025-11-11 07:35:31
NVD nvd_CVE-2019-12717 2025-11-11 14:56:27 2025-11-11 07:44:03
CNNVD cnnvd_CNNVD-201909-1140 2025-11-11 15:10:17 2025-11-11 07:54:52
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:54:52
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201909-1140; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201909-1140
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:03
affected_products_count: 1 → 2; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 2
  • data_sources: ['cve'] -> ['cve', 'nvd']