U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-1726

Change History

Initial Analysis by NIST 5/16/2019 1:02:35 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 4.0 up to (excluding) 4.0\(1d\)
     OR
          cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 5.2 up to (excluding) 6.2\(25\)
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 8.3\(2\)
     OR
          cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 6.0\(2\)a8 up to (excluding) 6.0\(2\)a8\(11\)
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.0\(3\) up to (excluding) 7.0\(3\)i7\(3\)
     OR
          cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.2\(22\)
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.2 up to (excluding) 7.3\(3\)d1\(1\)
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 8.0 up to (excluding) 8.3\(2\)
     OR
          cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.0\(3\)i7 up to (excluding) 7.0\(3\)i7\(3\)
     OR
          cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 7.3\(4\)n1\(1\)
     OR
          cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-20
Changed Reference Type
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cli-bypass No Types Assigned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cli-bypass Vendor Advisory