Cisco FXOS Software Secure Configuration Bypass (cisco-sa-20190515-nxos-conf-bypass)

medium Nessus Plugin ID 132720


The remote device is missing a vendor-supplied security patch


According to its self-reported version, Cisco FXOS Software is affected by a configuration bypass vulnerability due to a lack of proper validation of system files when the persistent configuration information is read from the file system. An authenticated, local attacker can exploit this, by authenticating to the device and overwriting the persistent configuration storage with malicious executable files. An exploit allows the attacker to run arbitrary commands at system startup with root privileges.

Please see the included Cisco BIDs and Cisco Security Advisory for more information


Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvi96584.

See Also

Plugin Details

Severity: Medium

ID: 132720

File Name: cisco-sa-20190515-fxos-conf-bypass.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 1/9/2020

Updated: 3/29/2021

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-1728


Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:fxos

Required KB Items: installed_sw/FXOS

Exploit Ease: No known exploits are available

Patch Publication Date: 5/15/2019

Vulnerability Publication Date: 5/15/2019

Reference Information

CVE: CVE-2019-1728

BID: 108391

IAVA: 2019-A-0173

CISCO-SA: cisco-sa-20190515-nxos-conf-bypass