#VU6982 Improper input validation in Cisco ASR 5000 Series


Published: 2017-06-08

Vulnerability identifier: #VU6982

Vulnerability risk: Low

CVSSv3.1: 4.4 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-6690

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco ASR 5000 Series
Hardware solutions / Firmware

Vendor: Cisco Systems, Inc

Description
The vulnerability allows a remote authenticated attacker to overwrite or modify arbitrary files.

The weakness exists due to insufficient input validation by the affected operating system. A remote attacker can send a specially crafted command-line requests and overwrite or modify arbitrary files on the affected system.

Successful exploitation of the vulnerability results in data modification.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Cisco ASR 5000 Series: 21.0.v0.65839 - 21.3.M0.67005


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-staros


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability