Security restrictions bypass in Cisco ASR 5000 Series - CVE-2017-6773
Published: August 17, 2017
Vulnerability identifier: #VU7966
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6773
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco ASR 5000 Series
Cisco ASR 5000 Series
Detailed vulnerability description
The vulnerability allows a local attacker to bypass security restrictions on the target system.
The weakness exists in the CLI of Cisco ASR 5000 Series Aggregated Services Routers running the Cisco StarOS operating system due to insufficient sanitization of user-supplied input. A local attacker can bypass the CLI restrictions and execute commands.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in the CLI of Cisco ASR 5000 Series Aggregated Services Routers running the Cisco StarOS operating system due to insufficient sanitization of user-supplied input. A local attacker can bypass the CLI restrictions and execute commands.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2017-6773
The vulnerability is addressed in the following versions: 21.4.D0.67500, 21.4.D0.67459, 21.4.A0.67505, 21.4.A0.67449, 21.3.M0.67496, 21.3.M0.67447.