Symptom
A vulnerability in the CLI of Cisco NX-OS Software for Nexus 5500, Nexus 5600 and Nexus 6000 Series could allow an authenticated, local administrator to execute arbitrary commands on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of arguments that are passed to a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system.
Conditions
The affected CLI command requires admin level privileges in order to be used.
Further Problem Description
None.
PSIRT Evaluation
The Cisco PSIRT has assigned this bug the following CVSS version 3.1 score. The Base CVSS score as of the time of evaluation is 3.4:
https://sec.cloudapps.cisco.com/security/center/cvssCalculator.x?vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
No CVE ID has been assigned to this issue.
Information about Fixed, Vulnerable, and Non-vulnerable releases--as well as information about fixed release availability--is not maintained by Cisco PSIRT. Please refer to the appropriate fields in this bug. If you require additional help to obtain this information, please open a support case with your support organization.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html