Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Try our Premium Alert Service
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service

Category:   Device (Router/Bridge/Hub)  >   Cisco NX-OS Vendors:   Cisco
Cisco NX-OS Remote Authenticated SSH Users Bypass AAA Security Restrictions on the Target System
SecurityTracker Alert ID:  1036947
SecurityTracker URL:
CVE Reference:   CVE-2015-0721   (Links to External Site)
Date:  Oct 5 2016
Impact:   Disclosure of system information, Execution of arbitrary code via network, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Various Nexus models
Description:   A vulnerability was reported in Cisco NX-OS. A remote authenticated user can bypass security restrictions.

A remote authenticated user can supply specially crafted data to exploit a flaw in the SSH service to bypass authentication, authorization, and accounting (AAA) restrictions on the target system. This can be exploited to execute command line interface commands that are ostensibly restricted to privileged user roles only.

Systems configured for AAA authentication and accessible via SSH for IPv4 or IPv6 are affected.

The following products are affected:

Multilayer Director Switches
Nexus 1000V Series Switches
Nexus 2000 Series Fabric Extenders
Nexus 3000 Series Switches
Nexus 3500 Platform Switches
Nexus 4000 Series Switches
Nexus 5000 Series Switches
Nexus 5500 Platform Switches
Nexus 5600 Platform Switches
Nexus 6000 Series Switches
Nexus 7000 Series Switches
Nexus 7700 Series Switches
Nexus 9000 Series Switches in NX-OS mode

The vendor has assigned bug IDs CSCum35502, CSCum47367 , CSCuw78669, CSCuw79754, and CSCux88492 to this vulnerability.

Impact:   A remote authenticated user can bypass security controls on the target system.
Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor advisory.

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, LLC