First published: Thu Aug 17 2017(Updated: )
A vulnerability in the CLI of Cisco ASR 5000 Series Aggregated Services Routers running the Cisco StarOS operating system could allow an authenticated, local attacker to bypass the CLI restrictions and execute commands on the underlying operating system. The vulnerability is due to insufficient input sanitization of user-supplied input at the CLI. An attacker could exploit this vulnerability by crafting a script on the device that will allow them to bypass built-in restrictions. An exploit could allow the unauthorized user to launch the CLI directly from a command shell. Cisco Bug IDs: CSCvd47722. Known Affected Releases: 21.0.v0.65839.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 5000 Software | =21.0.v0.65839 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6773 is considered a high severity vulnerability due to its potential to allow local authenticated attackers to bypass CLI restrictions.
To fix CVE-2017-6773, you should update the Cisco ASR 5000 Series Aggregated Services Routers to a version of the software that resolves the vulnerability.
No, CVE-2017-6773 requires local authentication to exploit, meaning it cannot be exploited remotely.
Exploiting CVE-2017-6773 could allow an attacker to execute unauthorized commands on the underlying operating system of the affected device.
CVE-2017-6773 specifically affects Cisco ASR 5000 Software version 21.0.v0.65839.