5
CVSSv2

CVE-2019-1968

Published: 30/08/2019 Updated: 16/10/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote malicious user to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the malicious user to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco nx-os 8.1

cisco nx-os 8.2

cisco nx-os 8.3

cisco nx-os 7.3

cisco nx-os 6.1\\(2\\)i2

cisco nx-os 7.0\\(3\\)i4

cisco nx-os 9.2

cisco nx-os 6.1\\(2\\)i3

cisco nx-os 7.0\\(3\\)i7

cisco nx-os 6.0\\(2\\)a8

cisco nx-os 7.0\\(3\\)f

cisco nx-os 7.2

cisco nx-os 7.1

cisco nx-os 8.0

Vendor Advisories

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API An attacker could exploit this vulnerability by sending a crafted HTTP r ...