Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-0122 |
CWE-ID | CWE-20 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco ASR 5000 Series Hardware solutions / Firmware |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU10418
Risk: Low
CVSSv3.1: 5.1 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2018-0122
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local attacker bypass security restrictions and modify data on the target system.
The weakness exists in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers due to insufficient validation of user-supplied input. A local attacker can inject specially crafted command arguments into a vulnerable CLI command and overwrite or modify arbitrary files that are stored in the flash memory.
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.
Vulnerable software versionsCisco ASR 5000 Series: 21.3.0.67664
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-asr
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.