Total vulnerabilities in the database
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to access internal services that should be restricted on an affected device, such as the NX-API. The vulnerability is due to insufficient validation of arguments passed to a certain CLI command. An attacker could exploit this vulnerability by including malicious input as the argument to the affected command. A successful exploit could allow the attacker to bypass intended restrictions and access internal services of the device. An attacker would need valid device credentials to exploit this vulnerability.
Software | From | Fixed in |
---|---|---|
cisco / nx-os | 5.2 | 6.2\(25\) |
cisco / nx-os | 7.3 | 8.3\(2\) |
cisco / nx-os | 7.0\(3\)i7 | 7.0\(3\)i7\(3\) |
cisco / nx-os | - | 6.0\(2\)a8\(11\) |
cisco / nx-os | 7.0\(3\) | 7.0\(3\)i7\(3\) |
cisco / nx-os | - | 7.3\(4\)n1\(1\) |
cisco / nx-os | - | 6.2\(22\) |
cisco / nx-os | 7.2 | 7.3\(3\)d1\(1\) |
cisco / nx-os | 8.0 | 8.3\(2\) |
cisco / nx-os | - | 4.0\(1d\) |