Security restrictions bypass in Cisco ASR 5000 Series Routers



Published: 2018-02-08
Risk Low
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2018-0122
CWE-ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Cisco ASR 5000 Series
Hardware solutions / Firmware

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU10418

Risk: Low

CVSSv3.1: 5.1 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2018-0122

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local attacker bypass security restrictions and modify data on the target system.

The weakness exists in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers due to insufficient validation of user-supplied input. A local attacker can inject specially crafted command arguments into a vulnerable CLI command and overwrite or modify arbitrary files that are stored in the flash memory.

Mitigation

Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.

Vulnerable software versions

Cisco ASR 5000 Series: 21.3.0.67664

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-asr


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###