Security restrictions bypass in Cisco NX-OS - CVE-2018-0092

 

Security restrictions bypass in Cisco NX-OS - CVE-2018-0092

Published: January 19, 2018


Vulnerability identifier: #VU10106
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0092
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco NX-OS

Detailed vulnerability description

The vulnerability allows a local attacker to improperly delete valid user accounts.

The weakness exists in the network-operator user role implementation for Cisco NX-OS System Software due to a lack of proper role-based access control (RBAC) checks for the actions that a user with the network-operator role is allowed to perform. A local attacker can authenticate to the device with user credentials that give that user the network-operator role and impact the integrity of the device by deleting configured user credentials.

How to mitigate CVE-2018-0092

Update to version 7.0(3)I6(2) or 7.0(3)I7(2).

Sources