A vulnerability in the Tetration Analytics agent for Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to an incorrect permissions setting. An attacker could exploit this vulnerability by replacing valid agent files with malicious code. A successful exploit could result in the execution of code supplied by the attacker. Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running versions prior to 7.0(3)I7(5).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107322 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-tetra-ace | Vendor Advisory |
http://www.securityfocus.com/bid/107322 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-tetra-ace | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107322 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-tetra-ace - Vendor Advisory |
Information
Published : 2019-03-11 21:29
Updated : 2024-11-21 04:36
NVD link : CVE-2019-1618
Mitre link : CVE-2019-1618
CVE.ORG link : CVE-2019-1618
JSON object : View
Products Affected
cisco
- nexus_9000
- nx-os