Lucene search

K
cveCiscoCVE-2017-6707
HistoryJul 06, 2017 - 12:29 a.m.

CVE-2017-6707

2017-07-0600:29:00
CWE-78
cisco
web.nvd.nist.gov
36
cisco
staros
cli
command parsing
vulnerability
cisco asr 5000
cisco 5500 series
cisco 5700 series
cisco virtualized packet core
vpc software
command injection
linux root user
cisco bug ids
cscvc69329
cscvc72930
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0

Percentile

15.7%

A vulnerability in the CLI command-parsing code of the Cisco StarOS operating system for Cisco ASR 5000 Series 11.0 through 21.0, 5500 Series, and 5700 Series devices and Cisco Virtualized Packet Core (VPC) Software could allow an authenticated, local attacker to break from the StarOS CLI of an affected system and execute arbitrary shell commands as a Linux root user on the system, aka Command Injection. The vulnerability exists because the affected operating system does not sufficiently sanitize commands before inserting them into Linux shell commands. An attacker could exploit this vulnerability by submitting a crafted CLI command for execution in a Linux shell command as a root user. Cisco Bug IDs: CSCvc69329, CSCvc72930.

Affected configurations

Nvd
Node
ciscostarosMatch11.0_base
OR
ciscostarosMatch12.0.0
OR
ciscostarosMatch12.1_base
OR
ciscostarosMatch12.2\(300\)
OR
ciscostarosMatch12.2_base
OR
ciscostarosMatch14.0\(600\)
OR
ciscostarosMatch14.0.0
OR
ciscostarosMatch15.0\(912\)
OR
ciscostarosMatch15.0\(935\)
OR
ciscostarosMatch15.0\(938\)
OR
ciscostarosMatch15.0_base
OR
ciscostarosMatch16.0\(900\)
OR
ciscostarosMatch16.0.0
OR
ciscostarosMatch16.1.0
OR
ciscostarosMatch16.1.1
OR
ciscostarosMatch16.1.2
OR
ciscostarosMatch16.5.0
OR
ciscostarosMatch16.5.2
OR
ciscostarosMatch17.2.0
OR
ciscostarosMatch17.2.0.59184
OR
ciscostarosMatch17.3.0
OR
ciscostarosMatch17.3.1
OR
ciscostarosMatch17.3_base
OR
ciscostarosMatch17.7.0
OR
ciscostarosMatch18.0.0
OR
ciscostarosMatch18.0.0.57828
OR
ciscostarosMatch18.0.0.59167
OR
ciscostarosMatch18.0.0.59211
OR
ciscostarosMatch18.0.l0.59219
OR
ciscostarosMatch18.1.0
OR
ciscostarosMatch18.1.0.59776
OR
ciscostarosMatch18.1.0.59780
OR
ciscostarosMatch18.1_base
OR
ciscostarosMatch18.3.0
OR
ciscostarosMatch18.3_base
OR
ciscostarosMatch18.4.0
OR
ciscostarosMatch19.0.1
OR
ciscostarosMatch19.0.m0.60737
OR
ciscostarosMatch19.0.m0.60828
OR
ciscostarosMatch19.0.m0.61045
OR
ciscostarosMatch19.1.0
OR
ciscostarosMatch19.1.0.61559
OR
ciscostarosMatch19.2.0
OR
ciscostarosMatch19.3.0
OR
ciscostarosMatch20.0.0
OR
ciscostarosMatch20.0.1.0
OR
ciscostarosMatch20.0.1.a0
OR
ciscostarosMatch20.0.1.v0
OR
ciscostarosMatch20.0.2.3
OR
ciscostarosMatch20.0.2.3.65026
OR
ciscostarosMatch20.0.2.v1
OR
ciscostarosMatch20.0.m0.62842
OR
ciscostarosMatch20.0.m0.63229
OR
ciscostarosMatch20.0.v0
OR
ciscostarosMatch21.0.0
OR
ciscostarosMatch21.0_base
OR
ciscostarosMatch21.0_m0.64246
OR
ciscostarosMatch21.0_m0.64702
VendorProductVersionCPE
ciscostaros11.0_basecpe:2.3:o:cisco:staros:11.0_base:*:*:*:*:*:*:*
ciscostaros12.0.0cpe:2.3:o:cisco:staros:12.0.0:*:*:*:*:*:*:*
ciscostaros12.1_basecpe:2.3:o:cisco:staros:12.1_base:*:*:*:*:*:*:*
ciscostaros12.2(300)cpe:2.3:o:cisco:staros:12.2\(300\):*:*:*:*:*:*:*
ciscostaros12.2_basecpe:2.3:o:cisco:staros:12.2_base:*:*:*:*:*:*:*
ciscostaros14.0(600)cpe:2.3:o:cisco:staros:14.0\(600\):*:*:*:*:*:*:*
ciscostaros14.0.0cpe:2.3:o:cisco:staros:14.0.0:*:*:*:*:*:*:*
ciscostaros15.0(912)cpe:2.3:o:cisco:staros:15.0\(912\):*:*:*:*:*:*:*
ciscostaros15.0(935)cpe:2.3:o:cisco:staros:15.0\(935\):*:*:*:*:*:*:*
ciscostaros15.0(938)cpe:2.3:o:cisco:staros:15.0\(938\):*:*:*:*:*:*:*
Rows per page:
1-10 of 581

CNA Affected

[
  {
    "product": "Cisco StarOS",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco StarOS"
      }
    ]
  }
]

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0

Percentile

15.7%

Related for CVE-2017-6707