CVE-2019-1594 Detail
Modified
This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.
Current Description
A vulnerability in the 802.1X implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete input validation of Extensible Authentication Protocol over LAN (EAPOL) frames. An attacker could exploit this vulnerability by sending a crafted EAPOL frame to an interface on the targeted device. A successful exploit could allow the attacker to cause the Layer 2 (L2) forwarding process to restart multiple times, leading to a system-level restart of the device and a DoS condition. Note: This vulnerability affects only NX-OS devices configured with 802.1X functionality. Cisco Nexus 1000V Switch for VMware vSphere devices are affected in versions prior to 5.2(1)SV3(1.4b). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(5)N1(1) and 7.1(5)N1(1b). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(3). Nexus 9000 Series Fabric Switches in ACI Mode are affected in versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(4).
Source:
MITRE
View Analysis Description
Analysis Description
A vulnerability in the 802.1X implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete input validation of Extensible Authentication Protocol over LAN (EAPOL) frames. An attacker could exploit this vulnerability by sending a crafted EAPOL frame to an interface on the targeted device. A successful exploit could allow the attacker to cause the Layer 2 (L2) forwarding process to restart multiple times, leading to a system-level restart of the device and a DoS condition. Note: This vulnerability affects only NX-OS devices configured with 802.1X functionality. Cisco Nexus 1000V Switch for VMware vSphere devices are affected in versions prior to 5.2(1)SV3(1.4b). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(5)N1(1) and 7.1(5)N1(1b). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(3). Nexus 9000 Series Fabric Switches in ACI Mode are affected in versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(4).
Source:
MITRE
Severity
CVSS 3.x Severity and Metrics:
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS 2.0 Severity and Metrics:
Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:C)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Weakness Enumeration
CWE-ID |
CWE Name |
Source |
CWE-20 |
Improper Input Validation |
NIST
|
CWE-264 |
Permissions, Privileges, and Access Controls |
Cisco Systems, Inc.
|
Known Affected Software Configurations
Switch to CPE 2.2
Configuration 1 ( hide ) Configuration 2 ( hide ) Configuration 3 ( hide ) Configuration 4 ( hide ) Configuration 5 ( hide ) Configuration 6 ( hide ) cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* Show Matching CPE(s)
|
From (including) 7.0\(3\)i7 | Up to (excluding) 7.0\(3\)i7\(4\) | cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:* Show Matching CPE(s)
|
Configuration 7 ( hide ) Configuration 8 ( hide ) Configuration 9 ( hide ) Configuration 10 ( hide )
Change History
4 change records found
- show changes
CVE Modified by MITRE -
10/9/2019 7:47:25 PM
Action |
Type |
Old Value |
New Value |
Added |
CVSS V3 |
|
Cisco Systems, Inc. AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Added |
CWE |
|
Cisco Systems, Inc. CWE-264 |
Modified Analysis -
3/15/2019 11:46:12 AM
Action |
Type |
Old Value |
New Value |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.2\(20a\)
OR
cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.2 up to (excluding) 7.3\(3\)d1\(1\)
OR
cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 8.0 up to (excluding) 8.2\(3\)
OR
cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:* |
Changed |
CPE Configuration |
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 7.0\(3\)i7\(4\)
OR
cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:* |
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.0\(3\)i7 up to (excluding) 7.0\(3\)i7\(4\)
OR
cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:* |
Changed |
CPE Configuration |
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 7.0\(3\)i7\(4\)
OR
cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:* |
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.0\(3\)i7 up to (excluding) 7.0\(3\)i7\(4\)
OR
cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:* |
Changed |
CPE Configuration |
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 8.2\(3\)
OR
cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:* |
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 8.3 up to (excluding) 8.3\(1\)
OR
cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:* |
Changed |
Reference Type |
http://www.securityfocus.com/bid/107325 No Types Assigned |
http://www.securityfocus.com/bid/107325 Third Party Advisory, VDB Entry |
CVE Modified by MITRE -
3/9/2019 6:29:01 AM
Action |
Type |
Old Value |
New Value |
Added |
Reference |
|
http://www.securityfocus.com/bid/107325 [No Types Assigned] |
Initial Analysis -
3/7/2019 2:57:28 PM
Action |
Type |
Old Value |
New Value |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.2 up to (excluding) 7.3\(5)n1\(1\)
OR
cpe:2.3:h:cisco:nexus_2000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 13.2\(1l\)
OR
cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 5.2(1)sv3(1.4b)
OR
cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:vmware_vsphere:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 7.0\(3\)i7\(4\)
OR
cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 7.0\(3\)i7\(4\)
OR
cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 7.1\(5\)n1\(1b\)
OR
cpe:2.3:h:cisco:nexus_2000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 8.2\(3\)
OR
cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:* |
Added |
CVSS V2 |
|
(AV:A/AC:L/Au:N/C:N/I:N/A:C) |
Added |
CVSS V3 |
|
AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Added |
CWE |
|
CWE-20 |
Changed |
Reference Type |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-lan-auth No Types Assigned |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-lan-auth Patch, Vendor Advisory |
Quick Info
CVE Dictionary Entry:
CVE-2019-1594
NVD Published Date:
03/06/2019
NVD Last Modified:
10/09/2019
|