Rapid7 Vulnerability & Exploit Database

Cisco SAN-OS: Cisco Nexus Series Switches Telnet CLI Command Injection Vulnerability (CVE-2017-6650)

Back to Search

Cisco SAN-OS: Cisco Nexus Series Switches Telnet CLI Command Injection Vulnerability (CVE-2017-6650)

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
05/21/2017
Created
07/25/2018
Added
07/07/2017
Modified
10/30/2017

Description

A vulnerability in the Telnet CLI command of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into the Telnet CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86771.

Solution(s)

  • cisco-update-sanos

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;