First published: Fri Jun 04 2021(Updated: )
Multiple vulnerabilities in the authorization process of Cisco ASR 5000 Series Software (StarOS) could allow an authenticated, remote attacker to bypass authorization and execute a subset of CLI commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS | <21.16.9 | |
Cisco StarOS | >=21.17.0<21.17.10 | |
Cisco StarOS | >=21.18.0<21.18.16 | |
Cisco StarOS | >=21.19.0<21.19.11 | |
Cisco StarOS | >=21.19.n<21.19.n7 | |
Cisco StarOS | >=21.20.0<21.20.8 | |
Cisco ASR 5000 | ||
Cisco ASR 5500 | ||
Cisco Asr 5700 | ||
Cisco Virtualized Packet Core |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1540 is a vulnerability in the authorization process of Cisco ASR 5000 Series Software (StarOS) that could allow an authenticated, remote attacker to bypass authorization and execute a subset of CLI commands on an affected device.
CVE-2021-1540 has a severity score of 7.2 out of 10, which is considered high severity.
CVE-2021-1540 affects Cisco ASR 5000 Series Software (StarOS) versions 21.16.9 to 21.20.8.
An authenticated, remote attacker can exploit CVE-2021-1540 by bypassing authorization and executing a subset of CLI commands on the affected device.
Cisco has released patches to address CVE-2021-1540. It is recommended to update to the latest version of Cisco ASR 5000 Series Software (StarOS) to mitigate this vulnerability.