First published: Thu Feb 08 2018(Updated: )
A vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers could allow an authenticated, local attacker to overwrite system files that are stored in the flash memory of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the affected operating system. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command for the affected operating system. A successful exploit could allow the attacker to overwrite or modify arbitrary files that are stored in the flash memory of an affected system. To exploit this vulnerability, the attacker would need to authenticate to an affected system by using valid administrator credentials. Cisco Bug IDs: CSCvf93335.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS | =21.3.0.67664 | |
Cisco ASR 5000 | ||
Cisco ASR 5500 | ||
Cisco Asr 5700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0122 is a vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers.
CVE-2018-0122 has a severity value of 4.4, which is considered medium.
CVE-2018-0122 allows an authenticated, local attacker to overwrite system files stored in the flash memory of an affected system.
Cisco StarOS version 21.3.0.67664 is vulnerable to CVE-2018-0122.
To fix CVE-2018-0122, Cisco recommends upgrading to a fixed software release.