First published: Tue Jun 13 2017(Updated: )
A vulnerability in the file check operation of Cisco ASR 5000 Series Aggregated Services Routers running the Cisco StarOS operating system could allow an authenticated, remote attacker to overwrite or modify arbitrary files on an affected system. More Information: CSCvd73726. Known Affected Releases: 21.0.v0.65839 21.3.M0.67005. Known Fixed Releases: 21.4.A0.67087 21.4.A0.67079 21.4.A0.67013 21.3.M0.67084 21.3.M0.67077 21.3.M0.66994 21.3.J0.66993 21.1.v0.67082 21.1.V0.67083.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 5000 Series Routers | =21.0.v0.65839 | |
Cisco ASR 5000 Series Routers | =21.3.m0.67005 | |
Cisco ASR 5000 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6690 has a critical severity rating due to its potential to allow unauthorized file modifications by authenticated remote attackers.
To fix CVE-2017-6690, users should update the Cisco ASR 5000 Series Aggregated Services Router to the patched version provided by Cisco.
CVE-2017-6690 affects users running specific versions of the Cisco ASR 5000 Software, including 21.0.v0.65839 and 21.3.m0.67005.
The potential impacts of CVE-2017-6690 include unauthorized file access and modifications, which can compromise the integrity of the affected systems.
Yes, exploitation of CVE-2017-6690 requires authentication, allowing remote attackers who have access to the system to perform actions.