First published: Wed May 15 2019(Updated: )
A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-rpm-injec
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco NX-OS Software vulnerability is cisco-sa-20190515-nxos-rpm-injec.
The severity of the cisco-sa-20190515-nxos-rpm-injec vulnerability is medium with a CVSS score of 6.4.
The Cisco NX-OS Software is affected by the cisco-sa-20190515-nxos-rpm-injec vulnerability.
The vulnerability allows an authenticated, local attacker with administrator credentials to corrupt local variables, leading to arbitrary command injection.
There are no specific remediation steps mentioned for the cisco-sa-20190515-nxos-rpm-injec vulnerability. Please refer to the Cisco Security Advisory for any updates or patches.