6.8
CVSSv2

CVE-2014-0676

Published: 22/01/2014 Updated: 29/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 10 | Exploitability Score: 3.1
VMScore: 605
Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the TACACS+ command authorization code of Cisco NX-OS Software could allow an authenticated, local malicious user to execute certain commands without TACACS+ server authorization. The vulnerability is due to the processing of certain commands when executed in a sequence. An attacker could exploit this vulnerability by executing multiple commands in a sequence. A successful exploit could allow the malicious user to execute certain commands without TACACS+ server authorization. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit this vulnerability, an attacker must have local access to an affected device. This access requirement reduces the possibility of a successful exploit. Cisco indicates through the CVSS score that proof-of-concept exploit code exists; however, the code is not known to be publicly available.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco nx-os -

Vendor Advisories

A vulnerability in the TACACS+ command authorization code of Cisco NX-OS Software could allow an authenticated, local attacker to execute certain commands without TACACS+ server authorization The vulnerability is due to the processing of certain commands when executed in a sequence An attacker could exploit this vulnerability by executing multip ...