IntelliShield has updated this alert to correct the affected software versions and add an additional Cisco bug ID.
Cisco Nexus OS contains a vulnerability that could allow an authenticated, local attacker to execute arbitrary commands on a targeted device.
The vulnerability is due to improper sanitization of user-supplied values to command line interface commands. An authenticated, local attacker could exploit the vulnerability by issuing commands that contain malicious options on the device command line interface. If successful, the attacker could gain elevated privileges on the targeted device.
Cisco confirmed the vulnerability within software release notes and released software updates.
Cisco has published a list of affected Cisco Nexus OS Software and Cisco Unified Computing System software releases in the bug reports. The Vendor Announcements section of this alert contains links to the bug reports.
To exploit this vulnerability, an attacker must log in locally to a vulnerable device. Because of the critical function that affected products often serve in most environments, local access to an affected device is likely carefully controlled. As a result, the source of exploits is restricted to only trusted users currently granted local access, limiting the potential for exploitation.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
An authenticated, local attacker could exploit this vulnerability to execute arbitrary commands on the system with elevated privileges.
The vulnerability is due to improper sanitization of user-supplied values to command line interface commands.
An authenticated, local attacker could exploit this vulnerability by running commands supplied with malicious options. The processing of the malicious options by the affected system could cause the device to execute supplied commands on the underlying system, allowing the attacker to gain additional privileges on the affected device.
Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to access affected devices.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
Administrators are advised to monitor affected systems.
Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco. Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center at 1-800-553-2447 or 1-408-526-7209 or via e-mail at firstname.lastname@example.org.
Version 1, October 27, 2011, 2:09 PM: Cisco Nexus OS contains a vulnerability that could allow an authenticated, local attacker to execute arbitrary commands on a targeted device. Updates are available.
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.