
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN097
_____________________________________________________________________

DATE                : 26/02/2020

HARDWARE PLATFORM(S): Firepower 2100 Series
                      Firepower 4100 Series
                      Firepower 1000 Series
                      Firepower 9300 Security Appliances
                      UCS 6200 Series Fabric Interconnects
                      UCS 6300 Series Fabric Interconnects
                      UCS 6400 Series Fabric Interconnects.

OPERATING SYSTEM(S): Cisco FXOS Software, Cisco UCS Manager Software,
                     Cisco ASA Software, Cisco FTD Software.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cli-cmdinj
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cmdinj
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-ucs-cli-cmdinj
_____________________________________________________________________

Cisco FXOS and UCS Manager Software Local Management CLI Command
Injection Vulnerability

High

Advisory ID:       cisco-sa-20200226-fxos-ucs-cli-cmdinj
First Published:   2020 February 26 16:00 GMT
Version 1.0:       Final
Workarounds:       No workarounds available
Cisco Bug IDs:     CSCvo42634
                   CSCvo42654
                   CSCvp44202
                   CSCvp44232
CVSS Score:        Base 7.8

CVE-2020-3171
CWE-78


Summary

    A vulnerability in the local management (local-mgmt) CLI of Cisco
FXOS Software and Cisco UCS Manager Software could allow an
authenticated, local attacker to execute arbitrary commands on the
underlying operating system (OS) of an affected device.

    The vulnerability is due to insufficient input validation. An
attacker could exploit this vulnerability by including crafted arguments
to specific commands. A successful exploit could allow the attacker to
execute arbitrary commands on the underlying OS with the privileges of
the currently logged-in user for all affected platforms excluding Cisco
UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric
Interconnects, the injected commands are executed with root privileges.

    Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cli-cmdinj

    This advisory is part of the February 2020 Cisco FXOS and NX-OS
Software Security Advisory Bundled Publication, which includes six Cisco
Security Advisories that describe six vulnerabilities. For a complete
list of the advisories and links to them, see Cisco Event Response:
February 2020 Cisco FXOS and NX-OS Software Security Advisory Bundled
Publication.


Affected Products

    Vulnerable Products

    This vulnerability affects the following Cisco products if they are
running a vulnerable release of Cisco FXOS Software or Cisco UCS Manager
Software:
        Firepower 2100 Series
        Firepower 4100 Series
        Firepower 9300 Security Appliances
        UCS 6200 Series Fabric Interconnects
        UCS 6300 Series Fabric Interconnects
        UCS 6400 Series Fabric Interconnects

    For information about which Cisco software releases are vulnerable,
see the Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
advisory are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the
following Cisco products:
        Firepower 1000 Series
        MDS 9000 Series Multilayer Switches
        Nexus 1000 Virtual Edge for VMware vSphere
        Nexus 1000V Switch for Microsoft Hyper-V
        Nexus 1000V Switch for VMware vSphere
        Nexus 3000 Series Switches
        Nexus 5500 Platform Switches
        Nexus 5600 Platform Switches
        Nexus 6000 Series Switches
        Nexus 7000 Series Switches
        Nexus 9000 Series Fabric Switches in Application Centric
Infrastructure (ACI) mode
        Nexus 9000 Series Switches in standalone NX-OS mode


Workarounds

    There are no workarounds that address this vulnerability.


Fixed Software

    Cisco has released free software updates that address the
vulnerability described in this advisory. Customers may only install and
expect support for software versions and feature sets for which they
have purchased a license. By installing, downloading, accessing, or
otherwise using such software upgrades, customers agree to follow the
terms of the Cisco software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
have a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a maintenance
upgrade to software that was previously purchased. Free security
software updates do not entitle customers to a new software license,
additional software feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories and Alerts page, to determine
exposure and a complete upgrade solution.

    In all cases, customers should ensure that the devices to be
upgraded contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:

https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement
to a free upgrade.

    Cisco FXOS Software

    In the following table(s), the left column lists Cisco software
releases. The center column indicates whether a release is affected by
the vulnerability described in this advisory and the first release that
includes the fix for this vulnerability. The right column indicates
whether a release is affected by all the vulnerabilities described in
this bundle and which release includes fixes for those vulnerabilities.

    Firepower 2100 Series appliances use Cisco FXOS Software as an
underlying operating system, which is included in Cisco ASA Software
unified image bundles or in Cisco FTD Software unified image bundles.

    ASA Software for Firepower 2100 Series: CSCvo42654

Cisco ASA Software Release 	First Fixed Release for This
Vulnerability 	First Fixed Release for All Vulnerabilities Described in
the Bundle of Advisories

9.8     9.8.4.3              Migrate to a fixed release.
9.9 	9.9.2.47             9.9.2.66 (Mar 2020)
9.10 	9.10.1.10            Migrate to a fixed release.
9.12 	Not vulnerable.      9.12.3.6
9.13 	Not vulnerable.      9.13.1.5


    FTD Software for Firepower 2100 Series: CSCvo42654

Cisco FTD Software Release 	First Fixed Release for This Vulnerability
First Fixed Release for All Vulnerabilities Described in the Bundle of
Advisories

6.2.2    Migrate to a fixed release.  	Migrate to a fixed release.
6.2.3 	6.2.3.12 	6.2.3.16 (Apr 2020)
6.3.0 	6.3.0.2 	Migrate to a fixed release.
6.4.0 	Not vulnerable. 	6.4.0.8
6.5.0 	Not vulnerable. 	6.5.0.2


    FXOS Software for Firepower 4100 Series and Firepower 9300 Security
Appliances: CSCvo42634

Cisco FXOS Software Release 	First Fixed Release for This
Vulnerability 	First Fixed Release for All Vulnerabilities Described in
the Bundle of Advisories

Earlier than 2.2   Migrate to a fixed release.  Migrate to a fixed release.
2.2 	2.2.2.91 	Migrate to a fixed release.
2.3 	2.3.1.144 	Migrate to a fixed release.
2.4 	2.4.1.234 	Migrate to a fixed release.
2.6 	Not vulnerable. 	2.6.1.187
2.7    	Not vulnerable.    	2.7.1.106


    Cisco UCS Software

    In the following table(s), the left column lists Cisco software
releases. The center column indicates whether a release is affected by
the vulnerability described in this advisory and the first release that
includes the fix for this vulnerability. The right column indicates
whether a release is affected by all the vulnerabilities described in
this bundle and which release includes fixes for those vulnerabilities.

UCS 6200, 6300, and 6400 Series Fabric Interconnects: CSCvp44202 and
CSCvp44232

Cisco UCS Software Release 	First Fixed Release for This Vulnerability
First Fixed Release for All Vulnerabilities Described in the Bundle of
Advisories

Earlier than 3.2   Migrate to a fixed release.  Migrate to a fixed release.
3.2 	3.2(3n) 	3.2(3n)
4.0 	4.0(4g) 	4.0(4g)
4.1    	Not vulnerable.    	Not vulnerable.


    Additional Resources

    For help determining the best Cisco NX-OS Software release for a
Cisco Nexus Switch, administrators can refer to the following
Recommended Releases documents. If a security advisory recommends a
later release, Cisco recommends following the advisory guidance.

        Cisco MDS Series Switches
        Cisco Nexus 1000V for VMware Switch
        Cisco Nexus 3000 Series Switches
        Cisco Nexus 5500 Platform Switches
        Cisco Nexus 5600 Platform Switches
        Cisco Nexus 6000 Series Switches
        Cisco Nexus 7000 Series Switches
        Cisco Nexus 9000 Series Switches
        Cisco Nexus 9000 Series ACI-Mode Switches

    To determine the best release for Cisco UCS, see the Recommended
Releases documents in the release notes for the device.

Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not
aware of any public announcements or malicious use of the vulnerability
that is described in this advisory.


Source

    This vulnerability was found during internal security testing.


URL


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cli-cmdinj


Revision History

Version 	Description 	Section 	Status 	Date
1.0 	Initial public release. 	— 	Final 	2020-FEB-26


Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

_____________________________________________________________________

Cisco FXOS and UCS Manager Software CLI Command Injection Vulnerability

High

Advisory ID:      cisco-sa-20200226-fxos-ucs-cmdinj
First Published:  2020 February 26 16:00 GMT
Version 1.0:      Final
Workarounds:      No workarounds available
Cisco Bug IDs:    CSCvo42628
                  CSCvo42636
                  CSCvp44264
                  CSCvp44281
                  CSCvr49734
                  CSCvr58699
CVSS Score:       Base 7.8

CVE-2020-3167
CWE-78


Summary

    A vulnerability in the CLI of Cisco FXOS Software and Cisco UCS
Manager Software could allow an authenticated, local attacker to execute
arbitrary commands on the underlying operating system (OS).

    The vulnerability is due to insufficient input validation. An
attacker could exploit this vulnerability by including crafted arguments
to specific commands. A successful exploit could allow the attacker to
execute arbitrary commands on the underlying OS with the privileges of
the currently logged-in user for all affected platforms excluding Cisco
UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric
Interconnects, the injected commands are executed with root privileges.

    Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cmdinj

    This advisory is part of the February 2020 Cisco FXOS and NX-OS
Software Security Advisory Bundled Publication, which includes six Cisco
Security Advisories that describe six vulnerabilities. For a complete
list of the advisories and links to them, see Cisco Event Response:
February 2020 Cisco FXOS and NX-OS Software Security Advisory Bundled
Publication.


Affected Products


    Vulnerable Products

    This vulnerability affects the following Cisco products if they are
running a vulnerable release of Cisco FXOS Software or Cisco UCS Manager
Software:
        Firepower 1000 Series
        Firepower 2100 Series
        Firepower 4100 Series
        Firepower 9300 Security Appliances
        UCS 6200 Series Fabric Interconnects
        UCS 6300 Series Fabric Interconnects
        UCS 6400 Series Fabric Interconnects

    For information about which Cisco software releases are vulnerable,
see the Fixed Software section of this advisory.


    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
advisory are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the
following Cisco products:
        MDS 9000 Series Multilayer Switches
        Nexus 1000 Virtual Edge for VMware vSphere
        Nexus 1000V Switch for Microsoft Hyper-V
        Nexus 1000V Switch for VMware vSphere
        Nexus 3000 Series Switches
        Nexus 5500 Platform Switches
        Nexus 5600 Platform Switches
        Nexus 6000 Series Switches
        Nexus 7000 Series Switches
        Nexus 9000 Series Fabric Switches in Application Centric
Infrastructure (ACI) mode
        Nexus 9000 Series Switches in standalone NX-OS mode


Workarounds

    There are no workarounds that address this vulnerability.


Fixed Software

    Cisco has released free software updates that address the
vulnerability described in this advisory. Customers may only install and
expect support for software versions and feature sets for which they
have purchased a license. By installing, downloading, accessing, or
otherwise using such software upgrades, customers agree to follow the
terms of the Cisco software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
have a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a maintenance
upgrade to software that was previously purchased. Free security
software updates do not entitle customers to a new software license,
additional software feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories and Alerts page, to determine
exposure and a complete upgrade solution.

    In all cases, customers should ensure that the devices to be
upgraded contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:

https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement
to a free upgrade.
    Cisco FXOS Software

    In the following table(s), the left column lists Cisco software
releases. The center column indicates whether a release is affected by
the vulnerability described in this advisory and the first release that
includes the fix for this vulnerability. The right column indicates
whether a release is affected by all the vulnerabilities described in
this bundle and which release includes fixes for those vulnerabilities.

    Firepower 1000 Series and 2100 Series appliances use Cisco FXOS
Software as an underlying operating system, which is included in Cisco
ASA Software unified image bundles or in Cisco FTD Software unified
image bundles.

    ASA Software for Firepower 1000 Series and Firepower 2100 Series:
CSCvr49734

Cisco ASA Software Release 	First Fixed Release for This Vulnerability
First Fixed Release for All Vulnerabilities Described in the Bundle of
Advisories

9.8 	Migrate to a fixed release. 	Migrate to a fixed release.
9.9 	9.9.2.66 (Mar 2020)             9.9.2.66 (Mar 2020)
9.10 	Migrate to a fixed release. 	Migrate to a fixed release.
9.12 	9.12.3.6 	9.12.3.6
9.13 	9.13.1.5 	9.13.1.5


    FTD Software for Firepower 1000 Series and Firepower 2100 Series:
CSCvr49734

Cisco FTD Software Release 	First Fixed Release for This Vulnerability
First Fixed Release for All Vulnerabilities Described in the Bundle of
Advisories

6.2.2 	Migrate to a fixed release. 	Migrate to a fixed release.
6.2.3 	6.2.3.16 (Apr 2020)             6.2.3.16 (Apr 2020)
6.3.0 	Migrate to a fixed release. 	Migrate to a fixed release.
6.4.0 	6.4.0.8 	6.4.0.8
6.5.0 	6.5.0.2 	6.5.0.2


    FXOS Software for Firepower 4100 Series and Firepower 9300 Security
Appliances: CSCvo42628 and CSCvo42636

Cisco FXOS Software Release 	First Fixed Release for This
Vulnerability 	First Fixed Release for All Vulnerabilities Described in
the Bundle of Advisories

Earlier than 2.2    Migrate to a fixed release.    Migrate to a fixed
release.
2.2 	2.2.2.97 	Migrate to a fixed release.
2.3 	2.3.1.144 	Migrate to a fixed release.
2.4 	2.4.1.234 	Migrate to a fixed release.
2.6 	Not vulnerable. 	2.6.1.187
2.7    	Not vulnerable.    	2.7.1.106


    Cisco UCS Software

    In the following table(s), the left column lists Cisco software
releases. The center column indicates whether a release is affected by
the vulnerability described in this advisory and the first release that
includes the fix for this vulnerability. The right column indicates
whether a release is affected by all the vulnerabilities described in
this bundle and which release includes fixes for those vulnerabilities.


    UCS 6200, 6300, and 6400 Series Fabric Interconnects: CSCvp44264,
CSCvp44281, and CSCvr58699

Cisco UCS Software Release 	First Fixed Release for This Vulnerability
First Fixed Release for All Vulnerabilities Described in the Bundle of
Advisories

Earlier than 3.2 	Migrate to a fixed release. 	Migrate to a fixed release.
3.2 	3.2(3n) 	3.2(3n)
4.0 	4.0(4g) 	4.0(4g)
4.1    	Not vulnerable.    	Not vulnerable.


    Additional Resources

    For help determining the best Cisco NX-OS Software release for a
Cisco Nexus Switch, administrators can refer to the following
Recommended Releases documents. If a security advisory recommends a
later release, Cisco recommends following the advisory guidance.

        Cisco MDS Series Switches
        Cisco Nexus 1000V for VMware Switch
        Cisco Nexus 3000 Series Switches
        Cisco Nexus 5500 Platform Switches
        Cisco Nexus 5600 Platform Switches
        Cisco Nexus 6000 Series Switches
        Cisco Nexus 7000 Series Switches
        Cisco Nexus 9000 Series Switches
        Cisco Nexus 9000 Series ACI-Mode Switches

    To determine the best release for Cisco UCS, see the Recommended
Releases documents in the release notes for the device.


Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not
aware of any public announcements or malicious use of the vulnerability
that is described in this advisory.


Source

    This vulnerability was found during internal security testing.


URL


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cmdinj

Revision History

Version 	Description 	Section 	Status 	Date
1.0 	Initial public release. 	— 	Final 	2020-FEB-26


Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

_____________________________________________________________________

Cisco UCS Manager Software Local Management CLI Command Injection
Vulnerability

High

Advisory ID:      cisco-sa-20200226-ucs-cli-cmdinj
First Published:  2020 February 26 16:00 GMT
Version 1.0:      Final
Workarounds:      No workarounds available
Cisco Bug IDs:    CSCvq57926
CVSS Score:       Base 7.8

CVE-2020-3173
CWE-78


Summary

    A vulnerability in the local management (local-mgmt) CLI of Cisco
UCS Manager Software could allow an authenticated, local attacker to
execute arbitrary commands on the underlying operating system (OS) on an
affected device.

    The vulnerability is due to insufficient input validation of command
arguments. An attacker could exploit this vulnerability by including
crafted arguments to specific commands on the local management CLI. A
successful exploit could allow the attacker to execute arbitrary
commands on the underlying OS with the privileges of the currently
logged-in user for all affected platforms excluding Cisco UCS 6400
Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric
Interconnects, the injected commands are executed with root privileges.

    Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-ucs-cli-cmdinj
    This advisory is part of the February 2020 Cisco FXOS and NX-OS
Software Security Advisory Bundled Publication, which includes six Cisco
Security Advisories that describe six vulnerabilities. For a complete
list of the advisories and links to them, see Cisco Event Response:
February 2020 Cisco FXOS and NX-OS Software Security Advisory Bundled
Publication.


Affected Products


    Vulnerable Products

    This vulnerability affects the following Cisco products if they are
running a vulnerable release of Cisco UCS Manager Software:
        UCS 6200 Series Fabric Interconnects
        UCS 6300 Series Fabric Interconnects
        UCS 6400 Series Fabric Interconnects

    For information about which Cisco software releases are vulnerable,
see the Fixed Software section of this advisory.


    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
advisory are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the
following Cisco products:
        Firepower 1000 Series
        Firepower 2100 Series
        Firepower 4100 Series
        Firepower 9300 Security Appliances
        MDS 9000 Series Multilayer Switches
        Nexus 1000 Virtual Edge for VMware vSphere
        Nexus 1000V Switch for Microsoft Hyper-V
        Nexus 1000V Switch for VMware vSphere
        Nexus 3000 Series Switches
        Nexus 5500 Platform Switches
        Nexus 5600 Platform Switches
        Nexus 6000 Series Switches
        Nexus 7000 Series Switches
        Nexus 9000 Series Fabric Switches in Application Centric
Infrastructure (ACI) mode
        Nexus 9000 Series Switches in standalone NX-OS mode


Workarounds

    There are no workarounds that address this vulnerability.


Fixed Software

    Cisco has released free software updates that address the
vulnerability described in this advisory. Customers may only install and
expect support for software versions and feature sets for which they
have purchased a license. By installing, downloading, accessing, or
otherwise using such software upgrades, customers agree to follow the
terms of the Cisco software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
have a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a maintenance
upgrade to software that was previously purchased. Free security
software updates do not entitle customers to a new software license,
additional software feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories and Alerts page, to determine
exposure and a complete upgrade solution.

    In all cases, customers should ensure that the devices to be
upgraded contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:

https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement
to a free upgrade.


    Cisco UCS Software

    In the following table(s), the left column lists Cisco software
releases. The center column indicates whether a release is affected by
the vulnerability described in this advisory and the first release that
includes the fix for this vulnerability. The right column indicates
whether a release is affected by all the vulnerabilities described in
this bundle and which release includes fixes for those vulnerabilities.

    UCS 6200, 6300, and 6400 Series Fabric Interconnects: CSCvq57926

Cisco UCS Software Release 	First Fixed Release for This Vulnerability
First Fixed Release for All Vulnerabilities Described in the Bundle of
Advisories

Earlier than 3.2   Migrate to a fixed release.  Migrate to a fixed release.
3.2 	3.2(3n) 	3.2(3n)
4.0 	4.0(4c) 	4.0(4g)
4.1
    	Not vulnerable.
    	Not vulnerable.


    Additional Resources

    For help determining the best Cisco NX-OS Software release for a
Cisco Nexus Switch, administrators can refer to the following
Recommended Releases documents. If a security advisory recommends a
later release, Cisco recommends following the advisory guidance.

        Cisco MDS Series Switches
        Cisco Nexus 1000V for VMware Switch
        Cisco Nexus 3000 Series Switches
        Cisco Nexus 5500 Platform Switches
        Cisco Nexus 5600 Platform Switches
        Cisco Nexus 6000 Series Switches
        Cisco Nexus 7000 Series Switches
        Cisco Nexus 9000 Series Switches
        Cisco Nexus 9000 Series ACI-Mode Switches

    To determine the best release for Cisco UCS, see the Recommended
Releases documents in the release notes for the device.


Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not
aware of any public announcements or malicious use of the vulnerability
that is described in this advisory.


Source

    This vulnerability was found by Nikhil Sagotiya of Cisco during
internal security testing.


URL


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-ucs-cli-cmdinj


Revision History

Version 	Description 	Section 	Status 	Date
1.0 	Initial public release. 	— 	Final 	2020-February-26


Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================


