First published: Thu Nov 04 2021(Updated: )
A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Policy Suite | <21.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-40119.
The severity rating of CVE-2021-40119 is critical with a CVSS score of 9.8.
Cisco Policy Suite versions up to and including 21.1.0 are affected by CVE-2021-40119.
CVE-2021-40119 allows an unauthenticated, remote attacker to log in to an affected system as the root user by exploiting the reuse of static SSH keys across installations.
Yes, Cisco has released a security advisory with mitigation details for CVE-2021-40119. Please refer to the advisory for more information.