CVE-2019-1804

9.8 CRITICAL

📋 TL;DR

A critical vulnerability in Cisco Nexus 9000 Series ACI Mode switches allows unauthenticated remote attackers to gain root access via SSH over IPv6 using a default SSH key pair present in all affected devices. This affects organizations using vulnerable Cisco Nexus 9000 Series switches in ACI Mode. Only IPv6 connections are exploitable; IPv4 is not vulnerable.

💻 Affected Systems

Products:
  • Cisco Nexus 9000 Series Switches
Versions: All versions prior to 14.0(1h)
Operating Systems: Cisco NX-OS in ACI Mode
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects switches running in Application Centric Infrastructure (ACI) Mode. IPv6 must be enabled and accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the network switch with root privileges, enabling network disruption, data exfiltration, and lateral movement to other systems.

🟠

Likely Case

Unauthorized root access to the switch, allowing configuration changes, traffic interception, and persistence on the network.

🟢

If Mitigated

Limited impact if IPv6 is disabled or proper network segmentation isolates the switch from untrusted networks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires extracting the default SSH key materials, which are identical across all affected devices, and connecting via IPv6.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.0(1h) and later

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-nexus9k-sshkey

Restart Required: Yes

Instructions:

1. Download the fixed software version from Cisco. 2. Upgrade the switch to version 14.0(1h) or later. 3. Reboot the switch to apply the update.

🔧 Temporary Workarounds

Disable IPv6

all

Prevents exploitation by disabling IPv6 connectivity to the switch, as the vulnerability is only exploitable over IPv6.

no ipv6 enable

Restrict SSH Access

all

Limit SSH connections to trusted IP addresses using access control lists (ACLs).

ipv6 access-list SSH-ACL
permit ipv6 host <trusted_ip> any
deny ipv6 any any
interface <interface>
ipv6 traffic-filter SSH-ACL in

🧯 If You Can't Patch

  • Disable IPv6 on the switch to block the attack vector.
  • Implement strict network segmentation to isolate the switch from untrusted networks.

🔍 How to Verify

Check if Vulnerable:

Check the switch version: 'show version' and verify if it is below 14.0(1h). Also confirm the switch is in ACI Mode.

Check Version:

show version

Verify Fix Applied:

After patching, run 'show version' to confirm the version is 14.0(1h) or later. Test SSH access over IPv6 to ensure it is no longer vulnerable.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected SSH login attempts from unknown IPv6 addresses
  • Failed or successful SSH authentication logs showing root access

Network Indicators:

  • SSH connections over IPv6 to the switch from untrusted sources
  • Unusual network traffic patterns from the switch

SIEM Query:

source="switch_logs" AND (event="SSH login" OR event="authentication") AND (src_ip=IPv6:* AND dest_ip=switch_ip)

🔗 References

📤 Share & Export