Lucene search

K
cve[email protected]CVE-2017-6707
HistoryJul 06, 2017 - 12:29 a.m.

CVE-2017-6707

2017-07-0600:29:00
CWE-78
web.nvd.nist.gov
23
cisco
staros
cli
command parsing
vulnerability
cisco asr 5000
cisco 5500 series
cisco 5700 series
cisco virtualized packet core
vpc software
command injection
linux root user
cisco bug ids
cscvc69329
cscvc72930
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

8.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.9%

A vulnerability in the CLI command-parsing code of the Cisco StarOS operating system for Cisco ASR 5000 Series 11.0 through 21.0, 5500 Series, and 5700 Series devices and Cisco Virtualized Packet Core (VPC) Software could allow an authenticated, local attacker to break from the StarOS CLI of an affected system and execute arbitrary shell commands as a Linux root user on the system, aka Command Injection. The vulnerability exists because the affected operating system does not sufficiently sanitize commands before inserting them into Linux shell commands. An attacker could exploit this vulnerability by submitting a crafted CLI command for execution in a Linux shell command as a root user. Cisco Bug IDs: CSCvc69329, CSCvc72930.

Affected configurations

NVD
Node
ciscostarosMatch11.0_base
OR
ciscostarosMatch12.0.0
OR
ciscostarosMatch12.1_base
OR
ciscostarosMatch12.2\(300\)
OR
ciscostarosMatch12.2_base
OR
ciscostarosMatch14.0\(600\)
OR
ciscostarosMatch14.0.0
OR
ciscostarosMatch15.0\(912\)
OR
ciscostarosMatch15.0\(935\)
OR
ciscostarosMatch15.0\(938\)
OR
ciscostarosMatch15.0_base
OR
ciscostarosMatch16.0\(900\)
OR
ciscostarosMatch16.0.0
OR
ciscostarosMatch16.1.0
OR
ciscostarosMatch16.1.1
OR
ciscostarosMatch16.1.2
OR
ciscostarosMatch16.5.0
OR
ciscostarosMatch16.5.2
OR
ciscostarosMatch17.2.0
OR
ciscostarosMatch17.2.0.59184
OR
ciscostarosMatch17.3.0
OR
ciscostarosMatch17.3.1
OR
ciscostarosMatch17.3_base
OR
ciscostarosMatch17.7.0
OR
ciscostarosMatch18.0.0
OR
ciscostarosMatch18.0.0.57828
OR
ciscostarosMatch18.0.0.59167
OR
ciscostarosMatch18.0.0.59211
OR
ciscostarosMatch18.0.l0.59219
OR
ciscostarosMatch18.1.0
OR
ciscostarosMatch18.1.0.59776
OR
ciscostarosMatch18.1.0.59780
OR
ciscostarosMatch18.1_base
OR
ciscostarosMatch18.3.0
OR
ciscostarosMatch18.3_base
OR
ciscostarosMatch18.4.0
OR
ciscostarosMatch19.0.1
OR
ciscostarosMatch19.0.m0.60737
OR
ciscostarosMatch19.0.m0.60828
OR
ciscostarosMatch19.0.m0.61045
OR
ciscostarosMatch19.1.0
OR
ciscostarosMatch19.1.0.61559
OR
ciscostarosMatch19.2.0
OR
ciscostarosMatch19.3.0
OR
ciscostarosMatch20.0.0
OR
ciscostarosMatch20.0.1.0
OR
ciscostarosMatch20.0.1.a0
OR
ciscostarosMatch20.0.1.v0
OR
ciscostarosMatch20.0.2.3
OR
ciscostarosMatch20.0.2.3.65026
OR
ciscostarosMatch20.0.2.v1
OR
ciscostarosMatch20.0.m0.62842
OR
ciscostarosMatch20.0.m0.63229
OR
ciscostarosMatch20.0.v0
OR
ciscostarosMatch21.0.0
OR
ciscostarosMatch21.0_base
OR
ciscostarosMatch21.0_m0.64246
OR
ciscostarosMatch21.0_m0.64702

CNA Affected

[
  {
    "product": "Cisco StarOS",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco StarOS"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

8.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.9%

Related for CVE-2017-6707