A vulnerability in the CLI of Cisco NX-OS System Software running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack.

The vulnerability is due to insufficient input validation of command arguments.

An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command.

An exploit could allow the attacker to read or write arbitrary files at the userrsquo;s privilege level outside of the userrsquo;s path.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss
A vulnerability in the CLI of Cisco NX-OS System Software running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack.

The vulnerability is due to insufficient input validation of command arguments.

An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command.

An exploit could allow the attacker to read or write arbitrary files at the userrsquo;s privilege level outside of the userrsquo;s path.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss

Security Impact Rating: Medium

CVE: CVE-2017-6649

Leave a Reply