{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T01:09:51.259","vulnerabilities":[{"cve":{"id":"CVE-2019-1732","sourceIdentifier":"psirt@cisco.com","published":"2019-05-15T17:29:01.843","lastModified":"2024-11-21T04:37:12.157","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device."},{"lang":"es","value":"Una vulnerabilidad en el subsistema Remote Package Manager (RPM) del software NX-OS de Cisco podría permitir que un atacante local autorizado con credenciales de administrador explote una condición de carrera de tiempo de comprobación (TOCTOU) para corromper las variables locales , lo que podría dar lugar a una inyección de mando arbitraria. La vulnerabilidad se debe a la falta de un mecanismo de bloqueo adecuado en las variables críticas que deben permanecer estáticas hasta su uso. Un atacante podría explotar esta vulnerabilidad identificandose en un dispositivo afectado y emitiendo un conjunto de comandos CLI relacionados con RPM. Un ataque con éxito podría permitir al atacante realizar una inyección de comando arbitraria. El atacante podría necesitar credenciales de administrador para el dispositivo de destino."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.5,"impactScore":5.9}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-667"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0\\(3\\)i4","versionEndExcluding":"7.0\\(3\\)i7\\(4\\)","matchCriteriaId":"01EAB41F-6AE7-47D9-80EC-C9974E331506"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*","matchCriteriaId":"10FFC5E8-CC5A-4D31-A63A-19E72EC442AB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*","matchCriteriaId":"41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*","matchCriteriaId":"D14D4B4E-120E-4607-A4F1-447C7BF3052E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*","matchCriteriaId":"15702ACB-29F3-412D-8805-E107E0729E35"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*","matchCriteriaId":"32A532C0-B0E3-484A-B356-88970E7D0248"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*","matchCriteriaId":"43913A0E-50D5-47DD-94D8-DD3391633619"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*","matchCriteriaId":"A8E1073F-D374-4311-8F12-AD8C72FAA293"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*","matchCriteriaId":"10F80A72-AD54-4699-B8AE-82715F0B58E2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"9354B6A2-D7D6-442E-BF4C-FE8A336D9E94"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*","matchCriteriaId":"74CB4002-7636-4382-B33E-FBA060A13C34"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"10CEBF73-3EE0-459A-86C5-F8F6243FE27C"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*","matchCriteriaId":"8EBEBA5B-5589-417B-BF3B-976083E9FE54"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*","matchCriteriaId":"532CE4B0-A3C9-4613-AAAF-727817D06FB4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*","matchCriteriaId":"92E2CB2B-DA11-4CF7-9D57-3D4D48990DC0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*","matchCriteriaId":"63BE0266-1C00-4D6A-AD96-7F82532ABAA7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx_os:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0\\(3\\)","versionEndExcluding":"7.0\\(3\\)f3\\(5\\)","matchCriteriaId":"7F7EB3C5-C1B9-4B0A-844D-C5BFD42687EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*","matchCriteriaId":"97217080-455C-48E4-8CE1-6D5B9485864F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/108361","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-rpm-injec","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/108361","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-rpm-injec","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}