Symptom
A vulnerability in the command-line interface (CLI) of Cisco NX-OS System Software could allow an authenticated, local attacker to read the contents of arbitrary files.
The vulnerability is due to insufficient input validation for a specific CLI command. An attacker could exploit this vulnerability by issuing a crafted command on the CLI. An exploit could allow the attacker unauthorized access to read arbitrary files on the underlying local file system.
Note: On products that support multiple Virtual Device Contexts (VDC) this could allow an attacker to read files from any VDC.
Workaround
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos6
Further Problem Description
For information about vulnerable and not vulnerable software releases, and time frame for fixed software releases, please open a support case with your support organization. PSIRT does not provide or maintain this information for Medium SIR advisories.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 3 score. The Base CVSS score as of the time of evaluation is 6:
https://tools.cisco.com/security/center/cvssCalculator.x?version=3.0&vector=CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:X/RL:X/RC:X
CVE ID CVE-2017-12338 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html