Cisco Nexus 3600 Platform Switches vulnerabilities

14 known vulnerabilities affecting cisco/nexus_3600_platform_switches.

Total CVEs
14
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH9MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2019-1616HIGHCVSS 7.5≥ unspecified, < 7.0(3)F3(5)2019-03-11
CVE-2019-1616 [HIGH] CWE-20 CVE-2019-1616: A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauth A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted
cvelistv5nvd
CVE-2019-1612MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)F3(5)2019-03-11
CVE-2019-1612 [MEDIUM] CWE-77 CVE-2019-1612: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to e A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input
cvelistv5nvd
CVE-2019-1611MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)F3(5)2019-03-11
CVE-2019-1611 [MEDIUM] CWE-77 CVE-2019-1611: A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authentica A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by i
cvelistv5nvd
CVE-2019-1613MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)F3(5)2019-03-11
CVE-2019-1613 [MEDIUM] CWE-77 CVE-2019-1613: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to e A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input
cvelistv5nvd
CVE-2019-1604HIGHCVSS 7.8≥ unspecified, < 7.0(3)F3(5)2019-03-08
CVE-2019-1604 [HIGH] CWE-285 CVE-2019-1604: A vulnerability in the user account management interface of Cisco NX-OS Software could allow an auth A vulnerability in the user account management interface of Cisco NX-OS Software could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to an incorrect authorization check of user accounts and their associated Group ID (GID). An attacker could exploit this vulnerability by taking advantag
cvelistv5nvd
CVE-2019-1602HIGHCVSS 7.8≥ unspecified, < 7.0(3)F3(5)2019-03-08
CVE-2019-1602 [HIGH] CWE-264 CVE-2019-1602: A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive data that could be used to elevate their privileges to administrator. The vulnerability is due to improper implementation of filesystem permissions. An attacker could exploit this vulnerability by logging in to the CLI of
cvelistv5nvd
CVE-2019-1603HIGHCVSS 7.8≥ unspecified, < 7.0(3)F3(5)2019-03-08
CVE-2019-1603 [HIGH] CWE-285 CVE-2019-1603: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to e A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to escalate lower-level privileges to the administrator level. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to
cvelistv5nvd
CVE-2019-1601HIGHCVSS 7.8≥ unspecified, < 7.0(3)F3(5)2019-03-08
CVE-2019-1601 [HIGH] CWE-284 CVE-2019-1601: A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to gain read and write access to a critical configuration file. The vulnerability is due to a failure to impose strict filesystem permissions on the targeted device. An attacker could exploit this vulnerability by accessing and modifying res
cvelistv5nvd
CVE-2019-1605HIGHCVSS 7.8≥ unspecified, < 7.0(3)F3(5)2019-03-08
CVE-2019-1605 [HIGH] CWE-20 CVE-2019-1605: A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local at A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to incorrect input validation in the NX-API feature. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS request to an internal service on an affected device tha
cvelistv5nvd
CVE-2019-1609MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)F3(5)2019-03-08
CVE-2019-1609 [MEDIUM] CWE-77 CVE-2019-1609: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to e A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input
cvelistv5nvd
CVE-2019-1599HIGHCVSS 8.6≥ unspecified, < 7.0(3)F3(5)≥ unspecified, < 9.2(2)2019-03-07
CVE-2019-1599 [HIGH] CWE-399 CVE-2019-1599: A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams
cvelistv5nvd
CVE-2019-1596HIGHCVSS 7.8≥ unspecified, < 7.0(3)F3(5)2019-03-07
CVE-2019-1596 [HIGH] CWE-264 CVE-2019-1596: A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticat A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level to root. The attacker must authenticate with valid user credentials. The vulnerability is due to incorrect permissions of a system executable. An attacker could exploit this vulnerability by authenticat
cvelistv5nvd
CVE-2019-1600MEDIUMCVSS 4.4≥ unspecified, < 7.0(3)F3(5)2019-03-07
CVE-2019-1600 [MEDIUM] CWE-264 CVE-2019-1600: A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability
cvelistv5nvd
CVE-2019-1593HIGHCVSS 7.8≥ unspecified, < 7.0(3)F3(5)2019-03-06
CVE-2019-1593 [HIGH] CWE-264 CVE-2019-1593: A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticat A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level by executing commands authorized to other user roles. The attacker must authenticate with valid user credentials. The vulnerability is due to the incorrect implementation of a Bash shell command that al
cvelistv5nvd