CVE-2019-1731
15.05.2019, 17:29
A vulnerability in the SSH CLI key management functionality of Cisco NX-OS Software could allow an authenticated, local attacker to expose a user's private SSH key to all authenticated users on the targeted device. The attacker must authenticate with valid administrator device credentials. The vulnerability is due to incomplete error handling if a specific error type occurs during the SSH key export. An attacker could exploit this vulnerability by authenticating to the device and entering a crafted command at the CLI. A successful exploit could allow the attacker to expose a user's private SSH key. In addition, a similar type of error in the SSH key import could cause the passphrase-protected private SSH key to be imported unintentionally.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | nx-os | 𝑥 < 7.0\(3\)i4\(9\) |
cisco | nx-os | 7.0\(3\)i7 ≤ 𝑥 < 7.0\(3\)i7\(4\) |
cisco | nx-os | 𝑥 < 6.0\(2\)a8\(10\) |
cisco | nx-os | 7.0\(3\)i4 ≤ 𝑥 < 7.0\(3\)i7\(4\) |
cisco | nx-os | 𝑥 < 7.3\(4\)n1\(1\) |
cisco | nx-os | 7.0\(3\) ≤ 𝑥 < 7.0\(3\)f3\(5\) |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-755 - Improper Handling of Exceptional ConditionsThe software does not handle or incorrectly handles an exceptional condition.