CVE编号
CVE-2019-1593利用情况
暂无补丁情况
N/A披露时间
2019-03-07漏洞描述
Cisco Nexus 9500 R-Series Line Cards and Fabric Modules等都是美国思科(Cisco)公司的产品。Cisco Nexus 9500 R-Series Line Cards and Fabric Modules是一款9500R系列线卡模块。Cisco Nexus 3000 Series Switches是一款3000系列交换机。Cisco Nexus 3500 Platform Switches是一款3500系列平台交换机。Cisco NX-OS Software是一套交换机使用的数据中心级操作系统软件。 Cisco NX-OS Software中的Bash shell的实现存在权限许可和访问控制漏洞,该漏洞源于程序错误地实现了Bash shell命令。本地攻击者可通过向设备进行身份验证并向Bash弹出窗口注入特制的命令利用该漏洞将权限提升至管理员权限。以下产品受到影响:Cisco Nexus 3000 Series Switches;Nexus 3500 Platform Switches;Nexus 3600 Platform Switches;Nexus 7000 Series Switches;Nexus 7700 Series Switches;Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode;Nexus 9000 Series Switches in standalone NX-OS mode;Nexus 9500 R-Series Line Cards and Fabric Modules。解决建议
厂商已发布漏洞修复程序,请及时关注更新:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-bash-escal
参考链接 |
|
---|---|
http://www.securityfocus.com/bid/107324 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | cisco | nx-os | * |
Up to (excluding) 13.2\(4d\) |
|||||
运行在以下环境 | |||||||||
系统 | cisco | nx-os | * |
From (including) 14.0 |
Up to (excluding) 14.0\(1h\) |
||||
运行在以下环境 | |||||||||
系统 | cisco | nx-os | * |
From (including) 7.0\(3\) |
Up to (excluding) 7.0\(3\)f3\(5\) |
||||
运行在以下环境 | |||||||||
系统 | cisco | nx-os | * |
From (including) 7.0\(3\) |
Up to (excluding) 7.0\(3\)i7\(4\) |
||||
运行在以下环境 | |||||||||
系统 | cisco | nx-os | * |
From (including) 7.0\(3\)i4 |
Up to (excluding) 7.0\(3\)i4\(9\) |
||||
运行在以下环境 | |||||||||
系统 | cisco | nx-os | * |
From (including) 7.0\(3\)i5 |
Up to (excluding) 7.0\(3\)i7\(4\) |
||||
运行在以下环境 | |||||||||
系统 | cisco | nx-os | * |
From (including) 8.1 |
Up to (excluding) 8.2\(3\) |
||||
运行在以下环境 | |||||||||
系统 | cisco | nx-os | * |
From (including) 8.3 |
Up to (excluding) 8.3\(1\) |
||||
运行在以下环境 | |||||||||
系统 | debian_10 | opencv | * |
Up to (excluding) 3.2.0+dfsg-6 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | opencv | * |
Up to (excluding) 2.4.9.1+dfsg1-2+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_31 | opencv | * |
Up to (excluding) 3.4.10-1.fc31 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | opencv | * |
Up to (excluding) 3.3.1-lp151.6.3.1 |
|||||
运行在以下环境 | |||||||||
硬件 | cisco | nexus_3000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | nexus_3500 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | nexus_3600 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | nexus_7000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | nexus_7700 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | nexus_9000_in_aci_mode | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | nexus_9000_in_standalone | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | nexus_9500 | * | - | |||||
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...