CVE-2019-1804 (CNNVD-201905-005)
中文标题:
Cisco Nexus 9000 Series Fabric Switches 加密问题漏洞
英文标题:
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Default SSH Key Vulnerability
漏洞描述
中文描述:
Cisco Nexus 9000 Series Fabric Switches是美国思科(Cisco)公司的一款9000系列光纤交换机。 使用14.1(1i)之前版本固件的Cisco Nexus 9000 Series Fabric Switches(在Application Centric Infrastructure (ACI)模式下)中存在加密问题漏洞。该漏洞源于网络系统或产品未正确使用相关密码算法,导致内容未正确加密、弱加密、明文存储敏感信息等。
英文描述:
A vulnerability in the SSH key management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user. The vulnerability is due to the presence of a default SSH key pair that is present in all devices. An attacker could exploit this vulnerability by opening an SSH connection via IPv6 to a targeted device using the extracted key materials. An exploit could allow the attacker to access the system with the privileges of the root user. This vulnerability is only exploitable over IPv6; IPv4 is not vulnerable.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode 11.0.1b | - | < n/a | - |
cpe:2.3:a:cisco:cisco_nx-os_software_for_nexus_9000_series_fabric_switches_aci_mode_11.0.1b:*:*:*:*:*:*:*:*
|
| cisco | nexus_9332pq_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9332pq_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_93180yc-ex_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_93180yc-ex_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_93128tx_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_93128tx_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_93120tx_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_93120tx_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_93108tc-ex_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_93108tc-ex_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_9516_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9516_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_9508_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9508_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_9504_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9504_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_9500_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9500_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_9396tx_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9396tx_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_9396px_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9396px_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_9372tx_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9372tx_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
| cisco | nexus_9372px_firmware | 14.0\(3d\) | - | - |
cpe:2.3:o:cisco:nexus_9372px_firmware:14.0\(3d\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
CRITICALCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-1804 |
2025-11-11 15:20:08 | 2025-11-11 07:35:39 |
| NVD | nvd_CVE-2019-1804 |
2025-11-11 14:56:22 | 2025-11-11 07:44:10 |
| CNNVD | cnnvd_CNNVD-201905-005 |
2025-11-11 15:10:12 | 2025-11-11 07:54:29 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 加密问题
- cnnvd_id: 未提取 -> CNNVD-201905-005
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 14
- data_sources: ['cve'] -> ['cve', 'nvd']