Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Router/Bridge/Hub)  >   Cisco NX-OS Vendors:   Cisco
Cisco NX-OS Input Validation Flaw in Python Scripting Sandbox Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1039622
SecurityTracker URL:
CVE Reference:   CVE-2017-12301   (Links to External Site)
Date:  Oct 18 2017
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco NX-OS. A local user can obtain elevated privileges on the target system.

A local user with administrative or Python execution privileges can supply specially crafted parameter values to certain Python functions to escape the scripting sandbox and execute arbitrary commands on the underlying operating system.

The following devices running Cisco NX-OS are affected:

Multilayer Director Switches
Nexus 2000 Series Fabric Extenders
Nexus 3000 Series Switches
Nexus 3500 Platform Switches
Nexus 5000 Series Switches
Nexus 5500 Platform Switches
Nexus 5600 Platform Switches
Nexus 6000 Series Switches
Nexus 7000 Series Switches
Nexus 7700 Series Switches
Nexus 9000 Series Switches - Standalone, NX-OS mode
Nexus 9500 R-Series Line Cards and Fabric Modules

The vendor has assigned bug IDs CSCvb86832, CSCvd86474, CSCvd86479, CSCvd86484, CSCvd86490, CSCve97102, CSCvf12757, CSCvf12804, CSCvf12815, and CSCvf15198 to this vulnerability.

Cody Winkler reported this vulnerability.

Impact:   A local user can execute commands on the underlying operating system.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error

Message History:   None.

 Source Message Contents



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC