// For flags

CVE-2019-1732

Cisco NX-OS Software Remote Package Manager Command Injection Vulnerability

Severity Score

6.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device.

Una vulnerabilidad en el subsistema Remote Package Manager (RPM) del software NX-OS de Cisco podría permitir que un atacante local autorizado con credenciales de administrador explote una condición de carrera de tiempo de comprobación (TOCTOU) para corromper las variables locales , lo que podría dar lugar a una inyección de mando arbitraria. La vulnerabilidad se debe a la falta de un mecanismo de bloqueo adecuado en las variables críticas que deben permanecer estáticas hasta su uso. Un atacante podría explotar esta vulnerabilidad identificandose en un dispositivo afectado y emitiendo un conjunto de comandos CLI relacionados con RPM. Un ataque con éxito podría permitir al atacante realizar una inyección de comando arbitraria. El atacante podría necesitar credenciales de administrador para el dispositivo de destino.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-05-15 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-20 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-667: Improper Locking
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3000
Search vendor "Cisco" for product "Nexus 3000"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3100
Search vendor "Cisco" for product "Nexus 3100"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3100-z
Search vendor "Cisco" for product "Nexus 3100-z"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3100v
Search vendor "Cisco" for product "Nexus 3100v"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3200
Search vendor "Cisco" for product "Nexus 3200"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3400
Search vendor "Cisco" for product "Nexus 3400"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3500
Search vendor "Cisco" for product "Nexus 3500"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3524-x
Search vendor "Cisco" for product "Nexus 3524-x"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3524-xl
Search vendor "Cisco" for product "Nexus 3524-xl"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3548-x
Search vendor "Cisco" for product "Nexus 3548-x"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3548-xl
Search vendor "Cisco" for product "Nexus 3548-xl"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 9000
Search vendor "Cisco" for product "Nexus 9000"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 9200
Search vendor "Cisco" for product "Nexus 9200"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 9300
Search vendor "Cisco" for product "Nexus 9300"
--
Safe
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
>= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)
Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 9500
Search vendor "Cisco" for product "Nexus 9500"
--
Safe
Cisco
Search vendor "Cisco"
Nx Os
Search vendor "Cisco" for product "Nx Os"
>= 7.0\(3\) < 7.0\(3\)f3\(5\)
Search vendor "Cisco" for product "Nx Os" and version " >= 7.0\(3\) < 7.0\(3\)f3\(5\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 3600
Search vendor "Cisco" for product "Nexus 3600"
--
Safe