Lucene search

K
ciscoCiscoCISCO-SA-STAROS-PRIVILEGE-ESC-PYB7YTD
HistoryOct 07, 2020 - 4:00 p.m.

Cisco StarOS Privilege Escalation Vulnerability

2020-10-0716:00:00
tools.cisco.com
11
cisco
staros
vulnerability
cli
commands
privilege escalation
asr 5000
routers
authentication
exploit
root user
software updates

EPSS

0

Percentile

5.2%

A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device.

The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user on the affected device. To exploit this vulnerability, an attacker would need to have valid credentials on an affected device and know the password for the cli test-commands command.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-privilege-esc-pyb7YTd [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-privilege-esc-pyb7YTd”]

Affected configurations

Vulners
Node
ciscoasr_5000_series_softwareMatchany
OR
ciscoasr_9904Match5000_series_software
VendorProductVersionCPE
ciscoasr_5000_series_softwareanycpe:2.3:a:cisco:asr_5000_series_software:any:*:*:*:*:*:*:*
ciscoasr_99045000_series_softwarecpe:2.3:h:cisco:asr_9904:5000_series_software:*:*:*:*:*:*:*

EPSS

0

Percentile

5.2%

Related for CISCO-SA-STAROS-PRIVILEGE-ESC-PYB7YTD