Command Injection Vulnerability in Cisco NX-OS Software for Network Switches
CVE-2018-0313
8.8HIGH
Summary
A command injection vulnerability exists in the NX-API feature of Cisco's NX-OS Software, allowing an authenticated remote attacker to send a crafted packet to the management interface of affected systems. The flaw arises from inadequate input validation in the NX-API subsystem. An attacker can leverage this vulnerability by dispatching a malicious HTTP or HTTPS packet, potentially gaining the ability to execute arbitrary commands with root privileges. While NX-API is disabled by default, systems with it enabled are at risk, affecting various Cisco switch models.
Affected Version(s)
Cisco NX-OS unknown Cisco NX-OS unknown
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved