Lucene search

K
ciscoCiscoCISCO-SA-STAROS-SSH-PRIVESC-BMWEJC3H
HistoryApr 19, 2023 - 4:00 p.m.

Cisco StarOS Software Key-Based SSH Authentication Privilege Escalation Vulnerability

2023-04-1916:00:00
tools.cisco.com
42
cisco
staros
ssh
authentication
privilege escalation
vulnerability
software
validation
exploit
update
advisory

EPSS

0.001

Percentile

47.6%

A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.

This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h”]

Affected configurations

Vulners
Node
ciscoasr_5000_series_softwareMatchany
OR
ciscoultra_cloud_core_-_session_management_functionMatchany
OR
ciscoasr_9904Match5000_series_software
OR
ciscoultra_cloud_core_-_session_management_functionMatchany
VendorProductVersionCPE
ciscoasr_5000_series_softwareanycpe:2.3:a:cisco:asr_5000_series_software:any:*:*:*:*:*:*:*
ciscoultra_cloud_core_-_session_management_functionanycpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:any:*:*:*:*:*:*:*
ciscoasr_99045000_series_softwarecpe:2.3:h:cisco:asr_9904:5000_series_software:*:*:*:*:*:*:*

EPSS

0.001

Percentile

47.6%

Related for CISCO-SA-STAROS-SSH-PRIVESC-BMWEJC3H