Cisco Nexus 9000 Series Switches In Standalone Nx-Os Mode vulnerabilities

17 known vulnerabilities affecting cisco/nexus_9000_series_switches_in_standalone_nx-os_mode.

Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH12MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2019-1614HIGHCVSS 8.8≥ unspecified, < 7.0(3)I4(9)≥ unspecified, < 7.0(3)I7(4)2019-03-11
CVE-2019-1614 [HIGH] CWE-77 CVE-2019-1614: A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote a A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The vulnerability is due to incorrect input validation of user-supplied data by the NX-API subsystem. An attacker could exploit this vulnerability by sending malicious HTTP or HTTPS packets to the
cvelistv5nvd
CVE-2019-1618HIGHCVSS 7.8≥ unspecified, < 7.0(3)I7(5)2019-03-11
CVE-2019-1618 [HIGH] CWE-275 CVE-2019-1618: A vulnerability in the Tetration Analytics agent for Cisco Nexus 9000 Series Switches in standalone A vulnerability in the Tetration Analytics agent for Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to an incorrect permissions setting. An attacker could exploit this vulnerability by replacing valid agent files with malicious code. A succ
cvelistv5nvd
CVE-2019-1616HIGHCVSS 7.5≥ unspecified, < 7.0(3)I4(9)≥ unspecified, < 7.0(3)I7(4)2019-03-11
CVE-2019-1616 [HIGH] CWE-20 CVE-2019-1616: A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauth A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted
cvelistv5nvd
CVE-2019-1617HIGHCVSS 7.4≥ unspecified, < 7.0(3)I7(5)≥ unspecified, < 9.2(2)2019-03-11
CVE-2019-1617 [HIGH] CWE-913 CVE-2019-1617: A vulnerability in the Fibre Channel over Ethernet (FCoE) N-port Virtualization (NPV) protocol imple A vulnerability in the Fibre Channel over Ethernet (FCoE) N-port Virtualization (NPV) protocol implementation in Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to an incorrect processing of FCoE packets when the fcoe-npv feature is uninstalled. An attacker cou
cvelistv5nvd
CVE-2019-1612MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)I4(9)≥ unspecified, < 7.0(3)I7(4)2019-03-11
CVE-2019-1612 [MEDIUM] CWE-77 CVE-2019-1612: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to e A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input
cvelistv5nvd
CVE-2019-1611MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)I4(9)≥ unspecified, < 7.0(3)I7(5)2019-03-11
CVE-2019-1611 [MEDIUM] CWE-77 CVE-2019-1611: A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authentica A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by i
cvelistv5nvd
CVE-2019-1613MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)I4(9)≥ unspecified, < 7.0(3)I7(6)2019-03-11
CVE-2019-1613 [MEDIUM] CWE-77 CVE-2019-1613: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to e A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input
cvelistv5nvd
CVE-2019-1615MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)I7(5)2019-03-11
CVE-2019-1615 [MEDIUM] CWE-347 CVE-2019-1615: A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an a A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerability is due to improper verification of digital signatures for software images. An attacker could exploit this vu
cvelistv5nvd
CVE-2019-1606HIGHCVSS 7.8≥ unspecified, < 7.0(3)I7(4)2019-03-08
CVE-2019-1606 [HIGH] CWE-77 CVE-2019-1606: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to e A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input a
cvelistv5nvd
CVE-2019-1605HIGHCVSS 7.8≥ unspecified, < 7.0(3)I4(8)≥ unspecified, < 7.0(3)I7(1)2019-03-08
CVE-2019-1605 [HIGH] CWE-20 CVE-2019-1605: A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local at A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to incorrect input validation in the NX-API feature. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS request to an internal service on an affected device tha
cvelistv5nvd
CVE-2019-1609MEDIUMCVSS 6.7≥ unspecified, < 7.0(3)I4(9)≥ unspecified, < 7.0(3)I7(6)2019-03-08
CVE-2019-1609 [MEDIUM] CWE-77 CVE-2019-1609: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to e A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input
cvelistv5nvd
CVE-2019-1598HIGHCVSS 7.5≥ unspecified, < 7.0(3)I7(1)2019-03-07
CVE-2019-1598 [HIGH] CWE-20 CVE-2019-1598: Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) f Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP pack
cvelistv5nvd
CVE-2019-1599HIGHCVSS 8.6≥ unspecified, < 7.0(3)I7(6)≥ unspecified, < 9.2(2)2019-03-07
CVE-2019-1599 [HIGH] CWE-399 CVE-2019-1599: A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams
cvelistv5nvd
CVE-2019-1596HIGHCVSS 7.8≥ unspecified, < 7.0(3)I7(4)2019-03-07
CVE-2019-1596 [HIGH] CWE-264 CVE-2019-1596: A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticat A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level to root. The attacker must authenticate with valid user credentials. The vulnerability is due to incorrect permissions of a system executable. An attacker could exploit this vulnerability by authenticat
cvelistv5nvd
CVE-2019-1597HIGHCVSS 7.5≥ unspecified, < 7.0(3)I7(1)2019-03-07
CVE-2019-1597 [HIGH] CWE-20 CVE-2019-1597: Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) f Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP pack
cvelistv5nvd
CVE-2019-1594HIGHCVSS 7.4≥ unspecified, < 7.0(3)I7(4)2019-03-06
CVE-2019-1594 [HIGH] CWE-264 CVE-2019-1594: A vulnerability in the 802.1X implementation for Cisco NX-OS Software could allow an unauthenticated A vulnerability in the 802.1X implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete input validation of Extensible Authentication Protocol over LAN (EAPOL) frames. An attacker could exploit this vulnerability by
cvelistv5nvd
CVE-2019-1593HIGHCVSS 7.8≥ unspecified, < 7.0(3)I4(9)≥ unspecified, < 7.0(3)I7(4)2019-03-06
CVE-2019-1593 [HIGH] CWE-264 CVE-2019-1593: A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticat A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level by executing commands authorized to other user roles. The attacker must authenticate with valid user credentials. The vulnerability is due to the incorrect implementation of a Bash shell command that al
cvelistv5nvd