CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
47.6%
A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.
This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.
There are workarounds that address this vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | staros | * | cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* |
cisco | staros | 21.23.n | cpe:2.3:o:cisco:staros:21.23.n:*:*:*:*:*:*:* |
cisco | staros | 21.24 | cpe:2.3:o:cisco:staros:21.24:*:*:*:*:*:*:* |
cisco | staros | 21.27.m | cpe:2.3:o:cisco:staros:21.27.m:*:*:*:*:*:*:* |
cisco | staros | 21.28.m | cpe:2.3:o:cisco:staros:21.28.m:*:*:*:*:*:*:* |
cisco | asr_5000 | - | cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:* |
cisco | asr_5500 | - | cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:* |
cisco | asr_5700 | - | cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:* |
cisco | vpc-di | - | cpe:2.3:h:cisco:vpc-di:-:*:*:*:*:*:*:* |
cisco | vpc-si | - | cpe:2.3:h:cisco:vpc-si:-:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
47.6%