A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.

Project Subscriptions

Vendors Products
7000 10-slot Subscribe
7000 18-slot Subscribe
7000 4-slot Subscribe
7000 9-slot Subscribe
7700 10-slot Subscribe
7700 18-slot Subscribe
7700 2-slot Subscribe
7700 6-slot Subscribe
Mds 9132t Subscribe
Mds 9148s Subscribe
Mds 9148t Subscribe
Mds 9216 Subscribe
Mds 9216a Subscribe
Mds 9216i Subscribe
Mds 9222i Subscribe
Mds 9250i Subscribe
Mds 9396s Subscribe
Mds 9396t Subscribe
Mds 9506 Subscribe
Mds 9509 Subscribe
Mds 9513 Subscribe
Mds 9706 Subscribe
Mds 9710 Subscribe
Mds 9718 Subscribe
N77-f312ck-26 Subscribe
N77-f324fq-25 Subscribe
N77-f348xp-23 Subscribe
N77-f430cq-36 Subscribe
N77-m312cq-26l Subscribe
N77-m324fq-25l Subscribe
N77-m348xp-23l Subscribe
N7k-f248xp-25e Subscribe
N7k-f306ck-25 Subscribe
N7k-f312fq-25 Subscribe
N7k-m202cf-22l Subscribe
N7k-m206fq-23l Subscribe
N7k-m224xp-23l Subscribe
N7k-m324fq-25l Subscribe
N7k-m348xp-25l Subscribe
N9k-c92160yc-x Subscribe
N9k-c9236c Subscribe
N9k-c9272q Subscribe
N9k-c93180lc-ex Subscribe
N9k-c93180yc-ex Subscribe
N9k-c93180yc-fx Subscribe
N9k-c9504-fm-r Subscribe
N9k-c9508-fm-r Subscribe
N9k-x96136yc-r Subscribe
N9k-x9636c-r Subscribe
N9k-x9636c-rx Subscribe
N9k-x9636q-r Subscribe
N9k-x9732c-ex Subscribe
N9k-x9736c-fx Subscribe
Nexus 3048 Subscribe
Nexus 3524-x\/xl Subscribe
Nexus 3548-x\/xl Subscribe
Nexus 36180yc-r Subscribe
Nexus 3636c-r Subscribe
Nexus 5010 Subscribe
Nexus 5020 Subscribe
Nexus 5548p Subscribe
Nexus 5548up Subscribe
Nexus 5596t Subscribe
Nexus 5596up Subscribe
Nexus 56128p Subscribe
Nexus 5624q Subscribe
Nexus 5648q Subscribe
Nexus 5672up Subscribe
Nexus 5672up-16g Subscribe
Nexus 5696q Subscribe
Nexus 6001 Subscribe
Nexus 6004 Subscribe
Nexus 7000 Supervisor 1 Subscribe
Nexus 7000 Supervisor 2 Subscribe
Nexus 7000 Supervisor 2e Subscribe
Nexus 7700 Supervisor 2e Subscribe
Nexus 7700 Supervisor 3e Subscribe
Ucs-6296up Subscribe
Ucs 6248up Subscribe
Ucs 6324 Subscribe
Ucs 6332 Subscribe
Ucs 6332-16up Subscribe
X96136yc-r Subscribe
X9636c-r Subscribe
X9636c-rx Subscribe
X9636q-r Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10522 A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-21T19:15:13.546Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1965

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:51.782Z

cve-icon NVD

Status : Modified

Published: 2019-08-28T19:15:11.053

Modified: 2024-11-21T04:37:47.067

Link: CVE-2019-1965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses