Cisco NX-OS Software Python Sbox Escape Multiple Vulnerabilities (cisco-sa-nxos-psbe-ce-YvbTn5du)

high Nessus Plugin ID 206717

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco NX-OS Software is affected by multiple vulnerabilities.

- A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low- privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.
Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities.
For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide. (CVE-2024-20284, CVE-2024-20285, CVE-2024-20286)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwh77779, CSCwh77780, CSCwh77781, CSCwi52362, CSCwi52363, CSCwi52365, CSCwi52380, CSCwi52383, CSCwi52460, CSCwi52461

See Also

http://www.nessus.org/u?ac7296b4

http://www.nessus.org/u?0fd3f483

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77779

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77780

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77781

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi52362

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi52363

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi52365

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi52380

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi52383

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi52460

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi52461

Plugin Details

Severity: High

ID: 206717

File Name: cisco-sa-nxos-psbe-ce-YvbTn5du.nasl

Version: 1.5

Type: combined

Family: CISCO

Published: 9/6/2024

Updated: 10/23/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-20286

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Settings/ParanoidReport, Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Exploit Ease: No known exploits are available

Patch Publication Date: 8/28/2024

Vulnerability Publication Date: 8/28/2024

Reference Information

CVE: CVE-2024-20284, CVE-2024-20285, CVE-2024-20286