First published: Wed Jan 13 2021(Updated: )
A vulnerability in the Secure FTP (SFTP) of Cisco StarOS for Cisco ASR 5000 Series Routers could allow an authenticated, remote attacker to read arbitrary files on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the affected device. The vulnerability is due to insecure handling of symbolic links. An attacker could exploit this vulnerability by sending a crafted SFTP command to an affected device. A successful exploit could allow the attacker to read arbitrary files on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-file-read-L3RDvtey
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS Major |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-staros-file-read-L3RDvtey is considered high due to the potential for arbitrary file reading by an authenticated attacker.
To fix cisco-sa-staros-file-read-L3RDvtey, upgrade to the latest version of Cisco StarOS that addresses this vulnerability.
The vulnerability cisco-sa-staros-file-read-L3RDvtey affects Cisco ASR 5000 Series Routers running Cisco StarOS.
cisco-sa-staros-file-read-L3RDvtey enables authenticated remote attackers to read arbitrary files on affected Cisco devices.
Yes, an attacker must have valid credentials to exploit the vulnerability described in cisco-sa-staros-file-read-L3RDvtey.