HIGH · 7.8

CVE-2017-6650

A vulnerability in the Telnet CLI command of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command inject...

Vulnerability Description

A vulnerability in the Telnet CLI command of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into the Telnet CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86771.

CVSS Score

7.8

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
CiscoNx-Os7.1\(1\)n1\(1\)
CiscoNexus 5548Up-
CiscoNexus 5596T-
CiscoNexus 5596Up-
CiscoNexus 56128P-
CiscoNexus 5624Q-
CiscoNexus 5648Q-
CiscoNexus 5672Up-
CiscoNexus 5672Up-16G-
CiscoNexus 5696Q-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-6650?

CVE-2017-6650 is a vulnerability with a CVSS score of 7.8 (HIGH). A vulnerability in the Telnet CLI command of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command inject...

How severe is CVE-2017-6650?

CVE-2017-6650 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-6650?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Nx-Os, Cisco Nexus 5548Up, Cisco Nexus 5596T, Cisco Nexus 5596Up, Cisco Nexus 56128P.