Cisco NX-OS Software Remote Management Memory Leak Denial of Service Vulnerability (CVE-2019-1965)

high Nessus Plugin ID 128547

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco NX-OS Software is affected by vulnerability in the Virtual Shell (VSH) session management which could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.

Please see the included Cisco BIDs and Cisco Security Advisory for more information

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvi15409, CSCvn50393, CSCvn50443, CSCvn50446, and CSCvn52167

See Also

http://www.nessus.org/u?169b4cec

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi15409

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn50393

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn50443

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn50446

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn52167

Plugin Details

Severity: High

ID: 128547

File Name: cisco-sa-20190828-nxos-memleak-dos.nasl

Version: 1.5

Type: combined

Family: CISCO

Published: 9/6/2019

Updated: 12/20/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS Score Source: CVE-2019-1965

CVSS v3

Risk Factor: High

Base Score: 7.7

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Exploit Ease: No known exploits are available

Patch Publication Date: 8/28/2019

Vulnerability Publication Date: 8/28/2019

Reference Information

CVE: CVE-2019-1965