7.7
HIGH
CVE-2019-1965
Cisco NX-OS Software VSH Session Management Authentication Bypass Denial of Service
Description

A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.

INFO

Published Date :

Aug. 28, 2019, 7:15 p.m.

Last Modified :

Nov. 21, 2024, 4:37 a.m.

Remotely Exploitable :

Yes !

Impact Score :

4.0

Exploitability Score :

3.1
Affected Products

The following products are affected by CVE-2019-1965 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Cisco nx-os
2 Cisco nexus_5010
3 Cisco nexus_5020
4 Cisco nexus_5548p
5 Cisco nexus_5548up
6 Cisco nexus_5596up
7 Cisco nexus_3048
8 Cisco nexus_5596t
9 Cisco nexus_56128p
10 Cisco nexus_5672up
11 Cisco nexus_6001
12 Cisco nexus_6004
13 Cisco nexus_3524-x\/xl
14 Cisco nexus_3548-x\/xl
15 Cisco nexus_36180yc-r
16 Cisco nexus_3636c-r
17 Cisco nexus_5624q
18 Cisco nexus_5648q
19 Cisco nexus_5696q
20 Cisco ucs_6248up
21 Cisco ucs_6324
22 Cisco ucs_6332
23 Cisco ucs_6332-16up
24 Cisco nexus_7000_supervisor_1
25 Cisco nexus_7000_supervisor_2
26 Cisco nexus_7000_supervisor_2e
27 Cisco nexus_7700_supervisor_2e
28 Cisco nexus_7700_supervisor_3e
29 Cisco mds_9132t
30 Cisco mds_9148s
31 Cisco mds_9148t
32 Cisco mds_9216
33 Cisco mds_9216a
34 Cisco mds_9216i
35 Cisco mds_9222i
36 Cisco mds_9250i
37 Cisco mds_9396s
38 Cisco mds_9396t
39 Cisco mds_9506
40 Cisco mds_9509
41 Cisco mds_9513
42 Cisco mds_9706
43 Cisco mds_9710
44 Cisco mds_9718
45 Cisco nexus_5672up-16g
46 Cisco n9k-c92160yc-x
47 Cisco n9k-c9236c
48 Cisco n9k-c9272q
49 Cisco n9k-c93180lc-ex
50 Cisco n9k-c93180yc-ex
51 Cisco n9k-c93180yc-fx
52 Cisco n9k-c9504-fm-r
53 Cisco n9k-c9508-fm-r
54 Cisco n9k-x96136yc-r
55 Cisco n9k-x9636c-r
56 Cisco n9k-x9636c-rx
57 Cisco n9k-x9636q-r
58 Cisco n9k-x9732c-ex
59 Cisco n9k-x9736c-fx
60 Cisco x9636q-r
61 Cisco n77-f312ck-26
62 Cisco n77-f324fq-25
63 Cisco n77-f348xp-23
64 Cisco n77-f430cq-36
65 Cisco n77-m312cq-26l
66 Cisco n77-m324fq-25l
67 Cisco n77-m348xp-23l
68 Cisco n7k-f248xp-25e
69 Cisco n7k-f306ck-25
70 Cisco n7k-f312fq-25
71 Cisco n7k-m202cf-22l
72 Cisco n7k-m206fq-23l
73 Cisco n7k-m224xp-23l
74 Cisco n7k-m324fq-25l
75 Cisco n7k-m348xp-25l
76 Cisco x96136yc-r
77 Cisco x9636c-r
78 Cisco x9636c-rx
79 Cisco 7000_10-slot
80 Cisco 7000_18-slot
81 Cisco 7000_4-slot
82 Cisco 7000_9-slot
83 Cisco 7700_10-slot
84 Cisco 7700_18-slot
85 Cisco 7700_2-slot
86 Cisco 7700_6-slot
87 Cisco ucs-6296up
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2019-1965.

URL Resource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-memleak-dos Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-memleak-dos Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2019-1965 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2019-1965 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Oct. 16, 2020

    Action Type Old Value New Value
    Removed CVSS V3 NIST AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
    Added CVSS V3.1 NIST AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
    Removed CWE NIST CWE-400
    Added CWE NIST CWE-772
  • CVE Modified by [email protected]

    Oct. 09, 2019

    Action Type Old Value New Value
    Added CVSS V3 Cisco Systems, Inc. AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
    Added CWE Cisco Systems, Inc. CWE-400
  • Initial Analysis by [email protected]

    Sep. 05, 2019

    Action Type Old Value New Value
    Added CVSS V2 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
    Added CVSS V3 AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-memleak-dos No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-memleak-dos Vendor Advisory
    Added CWE CWE-400
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 5.2 up to (excluding) 6.2\(29\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 8.4 OR cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.0\(3\)f up to (excluding) 9.2 OR cpe:2.3:h:cisco:n9k-c9504-fm-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-c9508-fm-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-x96136yc-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-x9636c-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-x9636c-rx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-x9636q-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:x96136yc-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:x9636c-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:x9636c-rx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:x9636q-r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 7.1\(5\)n1\(1b\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 7.3\(5\)n1\(1\) OR cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 6.2\(22\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.2 up to (excluding) 7.3\(4\)d1\(1\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 8.0 up to (excluding) 8.2\(3\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 8.3 up to (excluding) 8.4 OR cpe:2.3:h:cisco:7000_10-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:7000_18-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:7000_4-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:7000_9-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:7700_10-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:7700_18-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:7700_2-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:7700_6-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n77-f312ck-26:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n77-f324fq-25:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n77-f348xp-23:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n77-f430cq-36:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n77-m324fq-25l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n7k-f248xp-25e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n7k-f306ck-25:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n7k-f312fq-25:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n7k-m202cf-22l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n7k-m206fq-23l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n7k-m224xp-23l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 7.0\(3\)i4\(9\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.0\(3\)i7 up to (excluding) 7.0\(3\)i7\(4\) OR cpe:2.3:h:cisco:n9k-c92160yc-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-c9236c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-c9272q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-x9732c-ex:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:n9k-x9736c-fx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 7.0\(3\)i7 up to (excluding) 7.0\(3\)i7\(6\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 9.2 up to (excluding) 9.2\(3\) OR cpe:2.3:h:cisco:nexus_3524-x\/xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3548-x\/xl:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (excluding) 3.2\(3k\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions from (including) 4.0 up to (excluding) 4.0\(2e\) OR cpe:2.3:h:cisco:ucs-6296up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Aug. 28, 2019

    Action Type Old Value New Value
    Changed Description A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection. A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2019-1965 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2019-1965 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.11 }} 0.00%

score

0.42332

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability