Risk | High |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2019-1969 CVE-2019-1963 CVE-2019-1977 CVE-2019-1965 CVE-2019-1964 CVE-2019-1962 CVE-2019-1968 CVE-2019-1967 |
CWE-ID | CWE-264 CWE-20 CWE-400 CWE-399 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Cisco NX-OS Operating systems & Components / Operating system Cisco FXOS Operating systems & Components / Operating system Cisco Nexus 9332PQ Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9508 Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9372TX-E Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 93108TC-EX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9504 Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 93120TX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 93108TC-FX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9396TX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9396PX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9516 Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9000 Series Switches in ACI Mode Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9372PX-E Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9348GC-FXP Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 93180YC-EX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 93128TX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 93180YC-FX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9364C Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9372PX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 93180LC-EX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9336PQ ACI Spine Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9372TX Switch Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9336C-FX2 Switch Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU20483
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-1969
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform SNMP polling of an affected device.
The vulnerability exists in the implementation of the Simple Network Management Protocol (SNMP) Access Control List (ACL) feature due to an incorrect length check when the configured ACL name is the maximum length, which is 32 ASCII characters. A remote attacker can perform SNMP polling of an affected device that should have been denied. The attacker has no control of the configuration of the SNMP ACL name.
Install updates from vendor's website.
Vulnerable software versionsCisco NX-OS: 7.0.3 I4 1 - 9.2
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20539
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-1963
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper validation of Abstract Syntax Notation One (ASN.1)-encoded variables in SNMP packets. A remote authenticated attacker can send a specially crafted SNMP packet to the SNMP daemon and cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition.
This vulnerability affects the following products if they have SNMP configured and they are running a vulnerable release of Cisco FXOS or NX-OS Software:
Mitigation
Install updates from vendor's website.
Vulnerable software versionsCisco NX-OS: 5.2 - 14.1
Cisco FXOS: 2.2 - 2.4
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20496
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-1977
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input due to improper endpoint learning when packets are received on a specific port from outside the ACI fabric and destined to an endpoint located on a border leaf when "Disable Remote Endpoint Learning" has been enabled. A remote attacker can cause a denial of service (DoS) condition on an endpoint device in certain circumstances.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCisco Nexus 9332PQ Switch: All versions
Cisco Nexus 9508 Switch: All versions
Cisco Nexus 9372TX-E Switch: All versions
Cisco Nexus 93108TC-EX Switch: All versions
Cisco Nexus 9504 Switch: All versions
Cisco Nexus 93120TX Switch: All versions
Cisco Nexus 93108TC-FX Switch: All versions
Cisco Nexus 9396TX Switch: All versions
Cisco Nexus 9396PX Switch: All versions
Cisco Nexus 9516 Switch: All versions
Cisco Nexus 9000 Series Switches in ACI Mode: All versions
Cisco NX-OS: 12.3.1h - 13.1.2p
Cisco Nexus 9372PX-E Switch: All versions
Cisco Nexus 9348GC-FXP Switch: All versions
Cisco Nexus 93180YC-EX Switch: All versions
Cisco Nexus 93128TX Switch: All versions
Cisco Nexus 93180YC-FX Switch: All versions
Cisco Nexus 9364C Switch: All versions
Cisco Nexus 9372PX Switch: All versions
Cisco Nexus 93180LC-EX Switch: All versions
Cisco Nexus 9336PQ ACI Spine Switch: All versions
Cisco Nexus 9372TX Switch: All versions
Cisco Nexus 9336C-FX2 Switch: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20491
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-1965
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause unexpected system behaviors and crashes.
The vulnerability exists in the Virtual Shell (VSH) session management due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. A remote authenticated attacker can repeatedly perform a remote management connection to the device and terminate the connection in an unexpected manner and cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition.
This vulnerability affects the following products that are running a Cisco NX-OS Software:
Install updates from vendor's website.
Vulnerable software versionsCisco NX-OS: 3.2 - 8.3
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20489
Risk: High
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2019-1964
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
Description
The vulnerability allows a remote attacker to cause an unexpected restart of the netstack process on an affected device.
The vulnerability exists due to improper validation of IPv6 traffic sent through an affected device. A remote attacker can send a malformed IPv6 packet through an affected device, cause a denial of service (DoS) condition while the netstack process restarts. A sustained attack could lead to a reboot of the device.
This vulnerability affects the following products that are running a Cisco NX-OS Software:
Mitigation
Install update from vendor's website.
Vulnerable software versionsCisco NX-OS: 8.1 - 8.3
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20488
Risk: High
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2019-1962
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of TCP packets when processed by the Cisco Fabric Services over IP (CFSoIP) feature. A remote attacker can send a malicious Cisco Fabric Services TCP packet, cause process crashes, resulting in a device reload and a DoS condition.
This vulnerability affects the following products that are running a Cisco NX-OS Software with CFSoIP enabled:
Install updates from vendor's website.
Vulnerable software versionsCisco NX-OS: 3.2 - 7.3
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20487
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-1968
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause a system process to unexpectedly restart.
The vulnerability exists due to incorrect validation of the HTTP header of a request that is sent to the NX-API feature. A remote attacker can send a specially crafted HTTP request to the NX-API and cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic.
Install updates from vendor's website.
Vulnerable software versionsCisco NX-OS: 6.0.2 U4 - 9.2
CPE2.3https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-api-dos
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20486
Risk: High
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2019-1967
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the Network Time Protocol (NTP) feature due to excessive use of system resources when logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. A remote attacker can flood the device with a steady stream of Mode 7 NTP packets and cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload.
Install updates from vendor's website.
Vulnerable software versionsCisco NX-OS: 6.0.2 U6 - 9.2
CPE2.3https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.