Cisco NX-OS CLI Auth LPE allows OS command exec
CVE-2024-20289 Published on August 28, 2024
Cisco NX-OS Software Command Injection Vulnerability
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.
Vulnerability Analysis
CVE-2024-20289 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a Shell injection Vulnerability?
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
CVE-2024-20289 has been classified to as a Shell injection vulnerability or weakness.
Products Associated with CVE-2024-20289
Want to know whenever a new CVE is published for Cisco Nx Os? stack.watch will email you.
Affected Versions
Cisco NX-OS Software:- Version 9.3(3) is affected.
- Version 9.3(4) is affected.
- Version 9.3(5) is affected.
- Version 9.3(6) is affected.
- Version 10.1(2) is affected.
- Version 10.1(1) is affected.
- Version 9.3(5w) is affected.
- Version 9.3(7) is affected.
- Version 9.3(7k) is affected.
- Version 10.2(1) is affected.
- Version 9.3(7a) is affected.
- Version 9.3(8) is affected.
- Version 10.2(1q) is affected.
- Version 10.2(2) is affected.
- Version 9.3(9) is affected.
- Version 10.1(2t) is affected.
- Version 10.2(3) is affected.
- Version 10.2(3t) is affected.
- Version 9.3(10) is affected.
- Version 10.2(2a) is affected.
- Version 10.3(1) is affected.
- Version 10.2(4) is affected.
- Version 10.3(2) is affected.
- Version 9.3(11) is affected.
- Version 10.3(3) is affected.
- Version 10.2(5) is affected.
- Version 9.3(12) is affected.
- Version 10.2(3v) is affected.
- Version 10.4(1) is affected.
- Version 10.3(99w) is affected.
- Version 10.2(6) is affected.
- Version 10.3(3w) is affected.
- Version 10.3(99x) is affected.
- Version 10.3(3o) is affected.
- Version 10.3(4) is affected.
- Version 10.3(3p) is affected.
- Version 10.3(4a) is affected.
- Version 10.4(2) is affected.
- Version 10.3(3q) is affected.
- Version 10.3(3x) is affected.
- Version 10.3(4g) is affected.
- Version 10.3(3r) is affected.
- Version 16.0(2h) is affected.
- Version 16.0(2j) is affected.
- Version 16.0(3d) is affected.
- Version 16.0(3e) is affected.
- Version 16.0(4c) is affected.
- Version 16.0(5h) is affected.
- Version 16.0(3g) is affected.
- Version 16.0(5j) is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.