A vulnerability in the SSH key management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user. The vulnerability is due to the presence of a default SSH key pair that is present in all devices. An attacker could exploit this vulnerability by opening an SSH connection via IPv6 to a targeted device using the extracted key materials. An exploit could allow the attacker to access the system with the privileges of the root user. This vulnerability is only exploitable over IPv6; IPv4 is not vulnerable.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Nexus 93108tc-ex
Subscribe
Nexus 93108tc-ex Firmware
Subscribe
Nexus 93120tx
Subscribe
Nexus 93120tx Firmware
Subscribe
Nexus 93128tx
Subscribe
Nexus 93128tx Firmware
Subscribe
Nexus 93180yc-ex
Subscribe
Nexus 93180yc-ex Firmware
Subscribe
Nexus 9332pq
Subscribe
Nexus 9332pq Firmware
Subscribe
Nexus 9372px
Subscribe
Nexus 9372px Firmware
Subscribe
Nexus 9372tx
Subscribe
Nexus 9372tx Firmware
Subscribe
Nexus 9396px
Subscribe
Nexus 9396px Firmware
Subscribe
Nexus 9396tx
Subscribe
Nexus 9396tx Firmware
Subscribe
Nexus 9500
Subscribe
Nexus 9500 Firmware
Subscribe
Nexus 9504
Subscribe
Nexus 9504 Firmware
Subscribe
Nexus 9508
Subscribe
Nexus 9508 Firmware
Subscribe
Nexus 9516
Subscribe
Nexus 9516 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-10361 | A vulnerability in the SSH key management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user. The vulnerability is due to the presence of a default SSH key pair that is present in all devices. An attacker could exploit this vulnerability by opening an SSH connection via IPv6 to a targeted device using the extracted key materials. An exploit could allow the attacker to access the system with the privileges of the root user. This vulnerability is only exploitable over IPv6; IPv4 is not vulnerable. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 19 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-19T19:08:10.858Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1804
Updated: 2024-08-04T18:28:42.878Z
Status : Modified
Published: 2019-05-03T17:29:00.813
Modified: 2024-11-21T04:37:24.863
Link: CVE-2019-1804
No data.
OpenCVE Enrichment
No data.
EUVD