Cisco NX-OS Software NX-API Command Injection Vulnerability

High Nessus Plugin ID 122751


The remote device is missing a vendor-supplied security patch


According to its self-reported version, Cisco NX-OS Software is affected by a vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The vulnerability is due to incorrect input validation of user-supplied data by the NX-API subsystem. An attacker could exploit this vulnerability by sending malicious HTTP or HTTPS packets to the management interface of an affected system that has the NX-API feature enabled. A successful exploit could allow the attacker to perform a command-injection attack and execute arbitrary commands with root privileges.

Note: NX-API is disabled by default.

Please see the included Cisco BIDs and Cisco Security Advisory for more information


Upgrade to the relevant fixed version referenced in Cisco advisory.

See Also

Plugin Details

Severity: High

ID: 122751

File Name: cisco-sa-20190306-nxos-NXAPI-cmdinj.nasl

Version: 1.2

Type: local

Family: CISCO

Published: 2019/03/11

Updated: 2019/05/17

Dependencies: 66696

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2019-1614

CVSS v2.0

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Patch Publication Date: 2019/03/06

Vulnerability Publication Date: 2019/03/06

Reference Information

CVE: CVE-2019-1614

CISCO-BUG-ID: CSCvj17615, CSCvk51420, CSCvk51423

CISCO-SA: cisco-sa-20190306-nxos-NXAPI-cmdinj

IAVA: 2019-A-0159