6.7
CVSSv3

CVE-2019-1803

Published: 03/05/2019 Updated: 13/10/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the filesystem management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker with administrator rights to gain elevated privileges as the root user on an affected device. The vulnerability is due to overly permissive file permissions of specific system files. An attacker could exploit this vulnerability by authenticating to an affected device, creating a crafted command string, and writing this crafted string to a specific file location. A successful exploit could allow the malicious user to execute arbitrary operating system commands as root on an affected device. The attacker would need to have valid administrator credentials for the device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco nexus_9000_series_application_centric_infrastructure -

Vendor Advisories

A vulnerability in the filesystem management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker with administrator rights to gain elevated privileges as the root user on an affected device The vulnerability is due to overly permissive file permissions of spe ...