#VU10900 Privilege escalation in Cisco ASR 5000 Series - CVE-2018-0224
Published: March 10, 2018
Vulnerability identifier: #VU10900
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0224
CWE-ID: CWE-77
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Cisco ASR 5000 Series
Cisco ASR 5000 Series
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers due toinsufficient validation of user-supplied input. A local attacker can inject malicious arguments into a vulnerable CLI command and execute arbitrary commands with root privileges.
The weakness exists in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers due toinsufficient validation of user-supplied input. A local attacker can inject malicious arguments into a vulnerable CLI command and execute arbitrary commands with root privileges.
Remediation
Update to version 21.6.RU0.68455, 21.6.D0.68319, 21.6.A0.68321, 21.5.M0.68317, 21.5.C0.68318, 21.5.0.68363, 21.5.0