CVE-2016-1329
CRITICALCisco NX-OS <6.0(2)U6(5)-<6.0(2)A7(1) - Privilege Escalation
Title source: llmDescription
Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800.
References (3)
Core 3
Core References
Various Sources x_refsource_misc
https://isc.sans.edu/forums/diary/20795
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1035161
Vendor Advisory vendor-advisory
x_refsource_cisco
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k
Scores
CVSS v3
9.8
EPSS
0.0207
EPSS Percentile
84.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-287
Status
published
Products (4)
samsung/x14j_firmware
t-ms14jakucb-1102.5
sun/opensolaris
snv_124
zyxel/gs1900-10hp_firmware
< 2.50\(aazi.0\)c0
zzinc/keymouse_firmware
3.08
Published
Mar 03, 2016
Tracked Since
Feb 18, 2026