Privilege Escalation Vulnerability in Cisco ASR 5000/5500/5700 Series and Virtualized Packet Core
CVE-2017-3819
Summary
A privilege escalation vulnerability exists in the SSH subsystem of StarOS, affecting Cisco ASR 5000 Series, ASR 5500 Series, ASR 5700 Series, and Virtualized Packet Core devices. This vulnerability arises from inadequate input validation of SSH/SFTP login parameters. An authenticated remote attacker can exploit this weakness by using crafted user input during the SSH or SFTP login process, potentially gaining unrestricted root shell access. It's important to note that only traffic directed to the affected devices can be leveraged for exploitation, and this can occur over both IPv4 and IPv6. An active TCP connection to the SSH default port (22) is essential for the attack to succeed. Valid credentials are required for the attacker to log in via SSH or SFTP.
Affected Version(s)
Cisco StarOS Cisco StarOS
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved