CVE-2019-1732
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/05/2019
Last modified:
03/11/2021
Description
A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device.
Impact
Base Score 3.x
6.40
Severity 3.x
MEDIUM
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* | 7.0\(3\)i4 (including) | 7.0\(3\)i7\(4\) (excluding) |
| cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



