CVE-2019-14868
NixOS vulnerability analysis and mitigation

Overview

In ksh version 20120801, a critical security flaw was discovered in the way it evaluates certain environment variables. The vulnerability, identified as CVE-2019-14868, allows attackers to override or bypass environment restrictions to execute shell commands. This issue is particularly concerning as services and applications that allow remote unauthenticated attackers to provide environment variables could be exploited remotely (NVD, CVE).

Technical details

The vulnerability stems from KornShell's handling of environment variables during startup, where certain variables are interpreted as arithmetic expressions. Prior to the fix, these variables could contain arbitrary expressions, leading to potential code injection. The issue has a CVSS v3.1 base score of 7.8 (High), with vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access required but high impact on confidentiality, integrity, and availability (NVD).

Impact

The vulnerability allows attackers to execute arbitrary shell commands by bypassing environment restrictions. This is particularly dangerous in environments where ksh scripts are used by services or applications that accept remote user input for environment variables, as it could lead to remote code execution. The impact is heightened in scenarios where the shell is used in privileged contexts (Red Hat Bugzilla).

Mitigation and workarounds

The issue has been patched in various distributions and systems. The fix involves hardening the environment variable imports to only allow integer literals rather than arbitrary expressions. The patch was implemented in the AST project commit c7de8b641266bac7c77942239ac659edfee9ecd2, which improved validation of environment variables during shell initialization (GitHub Commit).

Community reactions

Multiple major vendors responded to this vulnerability by releasing security updates. Red Hat issued several security advisories (RHSA-2020:5351, RHSA-2020:2210) to address the vulnerability. Apple included fixes in their macOS security updates (Security Update 2020-003), and Debian released security patches through DLA-2284-1 (Debian Advisory, Apple Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68120MEDIUM5.4
  • NixOSNixOS
  • go
NoYesDec 30, 2025
CVE-2025-69413MEDIUM5.3
  • NixOSNixOS
  • code.gitea.io/gitea
NoYesJan 01, 2026
CVE-2025-15412MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-15411MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-68932LOW2.9
  • NixOSNixOS
  • freshrss
NoYesDec 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management