A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device.
2019-05-15T17:29:01.843
2024-11-21T04:37:12.157
Modified
CVSSv3.1: 6.4 (MEDIUM)
AV:L/AC:M/Au:N/C:C/I:C/A:C
3.4
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | cisco | nx-os | < 7.0\(3\)i7\(4\) | Yes |
Hardware | cisco | nexus_3000 | - | No |
Hardware | cisco | nexus_3100 | - | No |
Hardware | cisco | nexus_3100-z | - | No |
Hardware | cisco | nexus_3100v | - | No |
Hardware | cisco | nexus_3200 | - | No |
Hardware | cisco | nexus_3400 | - | No |
Hardware | cisco | nexus_3500 | - | No |
Hardware | cisco | nexus_3524-x | - | No |
Hardware | cisco | nexus_3524-xl | - | No |
Hardware | cisco | nexus_3548-x | - | No |
Hardware | cisco | nexus_3548-xl | - | No |
Hardware | cisco | nexus_9000 | - | No |
Hardware | cisco | nexus_9200 | - | No |
Hardware | cisco | nexus_9300 | - | No |
Hardware | cisco | nexus_9500 | - | No |
Operating System | cisco | nx_os | < 7.0\(3\)f3\(5\) | Yes |
Hardware | cisco | nexus_3600 | - | No |