A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108375 | Broken Link Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-psvb | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2019-05-15 23:29
Updated : 2024-02-28 17:08
NVD link : CVE-2019-1809
Mitre link : CVE-2019-1809
CVE.ORG link : CVE-2019-1809
JSON object : View
Products Affected
cisco
- n7k-m324fq-25l
- 7000_10-slot
- n77-f324fq-25
- n77-m348xp-23l
- nexus_7000_supervisor_2
- 7000_9-slot
- nexus_7000_supervisor_1
- n77-m324fq-25l
- mds_9706
- mds_9710
- 7700_2-slot
- 7000_18-slot
- n77-m312cq-26l
- nexus_7700_supervisor_3e
- ucs_6296up
- 7700_6-slot
- nx-os
- 7700_10-slot
- ucs_6332
- ucs_6332-16up
- mds_9718
- n77-f348xp-23
- nexus_7000_supervisor_2e
- ucs_6324
- n7k-f312fq-25
- n7k-m202cf-22l
- n7k-m206fq-23l
- 7000_4-slot
- n77-f312ck-26
- n7k-f248xp-25e
- ucs_6248up
- n7k-f306ck-25
- 7700_18-slot
- nexus_7700_supervisor_2e
- n7k-m348xp-25l
- n7k-m224xp-23l
- n77-f430cq-36
CWE
CWE-347
Improper Verification of Cryptographic Signature