Cisco ASR StarOS SSH Login Parameter Handling Privilege Escalation (cisco-sa-20170315-asr)

high Nessus Plugin ID 99266

Synopsis

The remote device is affected by a privilege escalation vulnerability.

Description

The remote Cisco ASR device is affected by a privilege escalation vulnerability in StarOS in the Secure Shell (SSH) subsystem due to improper validation of parameters passed during SSH or SFTP login. An authenticated, remote attacker can exploit this, by sending specially crafted input during the SSH or SFTP login, to gain root privileges.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCva65853.

See Also

http://www.nessus.org/u?908587cb

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCva65853

Plugin Details

Severity: High

ID: 99266

File Name: cisco-sa-20170315-asr.nasl

Version: 1.6

Type: local

Family: CISCO

Published: 4/10/2017

Updated: 7/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:cisco:asr_5700, cpe:/o:cisco:staros, cpe:/h:cisco:asr_5500, cpe:/a:cisco:asr_5700_series_software, cpe:/a:cisco:asr_5500_series_software, cpe:/h:cisco:asr_5000, cpe:/a:cisco:asr_5000_series_software

Required KB Items: Host/Cisco/ASR/Model, Host/Cisco/StarOS

Exploit Ease: No known exploits are available

Patch Publication Date: 3/15/2017

Vulnerability Publication Date: 3/15/2017

Reference Information

CVE: CVE-2017-3819

BID: 96913

CISCO-SA: cisco-sa-20170315-asr

CISCO-BUG-ID: CSCva65853