First published: Fri Jun 04 2021(Updated: )
Multiple vulnerabilities in the authorization process of Cisco ASR 5000 Series Software (StarOS) could allow an authenticated, remote attacker to bypass authorization and execute a subset of CLI commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS | <21.16.9 | |
Cisco StarOS | >=21.17.0<21.17.10 | |
Cisco StarOS | >=21.18.0<21.18.16 | |
Cisco StarOS | >=21.19.0<21.19.11 | |
Cisco StarOS | >=21.19.n<21.19.n7 | |
Cisco StarOS | >=21.20.0<21.20.8 | |
Cisco ASR 5000 | ||
Cisco ASR 5500 | ||
Cisco Asr 5700 | ||
Cisco Virtualized Packet Core |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1539 is a vulnerability in the authorization process of Cisco ASR 5000 Series Software (StarOS) that could allow an authenticated, remote attacker to bypass authorization and execute a subset of CLI commands on an affected device.
CVE-2021-1539 has a severity score of 8.8 (high).
CVE-2021-1539 affects Cisco ASR 5000 Series Software (StarOS) versions 21.16.9 to 21.20.8.
An authenticated, remote attacker can exploit CVE-2021-1539 by bypassing authorization and executing a subset of CLI commands on an affected device.
Yes, Cisco has released software updates to address CVE-2021-1539. It is recommended to update to the latest available version.