A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device.

Project Subscriptions

Vendors Products
Nexus 3000 Subscribe
Nexus 3100 Subscribe
Nexus 3100-z Subscribe
Nexus 3100v Subscribe
Nexus 3200 Subscribe
Nexus 3400 Subscribe
Nexus 3500 Subscribe
Nexus 3524-x Subscribe
Nexus 3524-xl Subscribe
Nexus 3548-x Subscribe
Nexus 3548-xl Subscribe
Nexus 3600 Subscribe
Nexus 9000 Subscribe
Nexus 9200 Subscribe
Nexus 9300 Subscribe
Nexus 9500 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10289 A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 20 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-20T17:22:27.579Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1732

cve-icon Vulnrichment

Updated: 2024-08-04T18:28:42.300Z

cve-icon NVD

Status : Modified

Published: 2019-05-15T17:29:01.843

Modified: 2024-11-21T04:37:12.157

Link: CVE-2019-1732

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses