CVE-2019-1732
Cisco NX-OS Software Remote Package Manager Command Injection Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device.
Una vulnerabilidad en el subsistema Remote Package Manager (RPM) del software NX-OS de Cisco podría permitir que un atacante local autorizado con credenciales de administrador explote una condición de carrera de tiempo de comprobación (TOCTOU) para corromper las variables locales , lo que podría dar lugar a una inyección de mando arbitraria. La vulnerabilidad se debe a la falta de un mecanismo de bloqueo adecuado en las variables críticas que deben permanecer estáticas hasta su uso. Un atacante podría explotar esta vulnerabilidad identificandose en un dispositivo afectado y emitiendo un conjunto de comandos CLI relacionados con RPM. Un ataque con éxito podría permitir al atacante realizar una inyección de comando arbitraria. El atacante podría necesitar credenciales de administrador para el dispositivo de destino.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2018-12-06 CVE Reserved
- 2019-05-15 CVE Published
- 2023-03-08 EPSS Updated
- 2024-11-20 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-667: Improper Locking
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/108361 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3000 Search vendor "Cisco" for product "Nexus 3000" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3100 Search vendor "Cisco" for product "Nexus 3100" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3100-z Search vendor "Cisco" for product "Nexus 3100-z" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3100v Search vendor "Cisco" for product "Nexus 3100v" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3200 Search vendor "Cisco" for product "Nexus 3200" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3400 Search vendor "Cisco" for product "Nexus 3400" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3500 Search vendor "Cisco" for product "Nexus 3500" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3524-x Search vendor "Cisco" for product "Nexus 3524-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3524-xl Search vendor "Cisco" for product "Nexus 3524-xl" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3548-x Search vendor "Cisco" for product "Nexus 3548-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3548-xl Search vendor "Cisco" for product "Nexus 3548-xl" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 9000 Search vendor "Cisco" for product "Nexus 9000" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 9200 Search vendor "Cisco" for product "Nexus 9200" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 9300 Search vendor "Cisco" for product "Nexus 9300" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\) Search vendor "Cisco" for product "Nx-os" and version " >= 7.0\(3\)i4 < 7.0\(3\)i7\(4\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 9500 Search vendor "Cisco" for product "Nexus 9500" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Nx Os Search vendor "Cisco" for product "Nx Os" | >= 7.0\(3\) < 7.0\(3\)f3\(5\) Search vendor "Cisco" for product "Nx Os" and version " >= 7.0\(3\) < 7.0\(3\)f3\(5\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Nexus 3600 Search vendor "Cisco" for product "Nexus 3600" | - | - |
Safe
|