CVE-2020-3454
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
27/08/2020
Last modified:
04/09/2020
Description
A vulnerability in the Call Home feature of Cisco NX-OS Software could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of specific Call Home configuration parameters when the software is configured for transport method HTTP. An attacker could exploit this vulnerability by modifying parameters within the Call Home configuration on an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying OS.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:mds_9134:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



