First published: Thu Mar 08 2018(Updated: )
A vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers could allow an authenticated, local attacker to execute arbitrary commands with root privileges on an affected operating system. The vulnerability is due to insufficient validation of user-supplied input by the affected operating system. An attacker could exploit this vulnerability by authenticating to an affected system and injecting malicious arguments into a vulnerable CLI command. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected system. Cisco Bug IDs: CSCvg38807.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS | =21.3.0.67664 | |
Cisco StarOS | =21.5.0 | |
Cisco ASR 5000 | ||
Cisco ASR 5500 | ||
Cisco Asr 5700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0224 is a vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers.
CVE-2018-0224 allows an authenticated, local attacker to execute arbitrary commands with root privileges on an affected operating system.
The severity of CVE-2018-0224 is high with a CVSS score of 6.7.
To mitigate CVE-2018-0224, Cisco recommends upgrading to a fixed software release and applying the appropriate configuration.
You can find more information about CVE-2018-0224 on the Cisco Security Advisory website.