From e065d1668140c72e2ada7495a1415197ea69e2ad Mon Sep 17 00:00:00 2001 From: santosomar Date: Thu, 7 Mar 2019 20:12:34 +0000 Subject: [PATCH] Adding Cisco CVE-2019-1607 --- 2019/1xxx/CVE-2019-1607.json | 109 ++++++++++++++++++++++++++++++----- 1 file changed, 93 insertions(+), 16 deletions(-) diff --git a/2019/1xxx/CVE-2019-1607.json b/2019/1xxx/CVE-2019-1607.json index b92bb6ad1a7..dad68a9b142 100644 --- a/2019/1xxx/CVE-2019-1607.json +++ b/2019/1xxx/CVE-2019-1607.json @@ -1,18 +1,95 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-1607", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } + "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2019-03-06T16:00:00-0800", + "ID": "CVE-2019-1607", + "STATE": "PUBLIC", + "TITLE": "Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1607)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Nexus 7000 and 7700 Series Switches", + "version": { + "version_data": [ + { + "affected": "<", + "version_value": "6.2(22)" + }, + { + "affected": "<", + "version_value": "7.3(3)D1(1)" + }, + { + "affected": "<", + "version_value": "8.2(3)" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3)." + } + ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "4.2", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1607)", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1607" + } + ] + }, + "source": { + "advisory": "cisco-sa-20190306-nxos-cmdinj-1607", + "defect": [ + [ + "CSCvi01416" + ] + ], + "discovery": "INTERNAL" + } }