Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-1732


A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device.


Published

2019-05-15T17:29:01.843

Last Modified

2024-11-21T04:37:12.157

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.4 (MEDIUM)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.4

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-78
  • Type: Primary
    CWE-667

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco nx-os < 7.0\(3\)i7\(4\) Yes
Hardware cisco nexus_3000 - No
Hardware cisco nexus_3100 - No
Hardware cisco nexus_3100-z - No
Hardware cisco nexus_3100v - No
Hardware cisco nexus_3200 - No
Hardware cisco nexus_3400 - No
Hardware cisco nexus_3500 - No
Hardware cisco nexus_3524-x - No
Hardware cisco nexus_3524-xl - No
Hardware cisco nexus_3548-x - No
Hardware cisco nexus_3548-xl - No
Hardware cisco nexus_9000 - No
Hardware cisco nexus_9200 - No
Hardware cisco nexus_9300 - No
Hardware cisco nexus_9500 - No
Operating System cisco nx_os < 7.0\(3\)f3\(5\) Yes
Hardware cisco nexus_3600 - No

References