{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T07:16:13.710","vulnerabilities":[{"cve":{"id":"CVE-2019-1602","sourceIdentifier":"psirt@cisco.com","published":"2019-03-08T19:29:00.327","lastModified":"2024-11-21T04:36:54.187","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive data that could be used to elevate their privileges to administrator. The vulnerability is due to improper implementation of filesystem permissions. An attacker could exploit this vulnerability by logging in to the CLI of an affected device, accessing a specific file, and leveraging this information to authenticate to the NX-API server. A successful exploit could allow an attacker to make configuration changes as administrator. Note: NX-API is disabled by default. Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)."},{"lang":"es","value":"Una vulnerabilidad en los permisos de \"filesystem\" del software NX-OS de Cisco podría permitir a un atacante local autenticado acceder a datos sensibles que podrían utilizarse para elevar sus propios privilegios a los del administrador. Esta vulnerabilidad se debe a la implementación incorrecta de permisos de \"filesystem\". Un atacante podría explotar esta vulnerabilidad iniciando sesión en la CLI de un dispositivo afectado, accediendo a un archivo específico y aprovechando esta información para autenticarse en el servidor NX-API. Su explotación con éxito podría permitir que el atacante realice cambios de configuración como el administrador. Nota: NX-API está deshabilitado por defecto. Los switches de Nexus 3000 Series se ven afectados en versiones anteriores a la 7.0(3)I7(4). Los switches de Nexus 3500 Platform se ven afectados en versiones anteriores a la 7.0(3)I7(4). Los switches de Nexus 3600 Platform se ven afectados en versiones anteriores a la 7.0(3)F3(5). Los switches de Nexus 9000 Series-Standalone se ven afectados en versiones anteriores a la 7.0(3)I7(4). Los switches de 9500 R-Series Line Cards y Fabric Modules se ven afectados en versiones anteriores a la 7.0(3)F3(5)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0\\(3\\)i5","versionEndExcluding":"7.0\\(3\\)i7\\(4\\)","matchCriteriaId":"C59A80D2-51B2-42C4-8FAA-F00A42388F90"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*","matchCriteriaId":"10FFC5E8-CC5A-4D31-A63A-19E72EC442AB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*","matchCriteriaId":"8EBEBA5B-5589-417B-BF3B-976083E9FE54"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0\\(3\\)f3","versionEndExcluding":"7.0\\(3\\)f3\\(5\\)","matchCriteriaId":"AB649123-3091-4A8E-A992-42E7BAE299ED"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*","matchCriteriaId":"97217080-455C-48E4-8CE1-6D5B9485864F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0\\(3\\)f1","versionEndExcluding":"7.0\\(3\\)f3\\(5\\)","matchCriteriaId":"5C856C77-493C-4543-8958-A9AEBBDCBBDD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*","matchCriteriaId":"63BE0266-1C00-4D6A-AD96-7F82532ABAA7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0\\(3\\)","versionEndExcluding":"7.0\\(3\\)f3\\(5\\)","matchCriteriaId":"96BFEE5D-EF9F-4C21-BC51-FBA71029A6A7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*","matchCriteriaId":"A8E1073F-D374-4311-8F12-AD8C72FAA293"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/107332","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-escalation","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/107332","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-escalation","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}