Cisco ASR StarOS CLI Command Injection Local Privilege Escalation (cisco-sa-20170705-asrcmd)

high Nessus Plugin ID 101528
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote device is affected by a privilege escalation vulnerability.


According to its self-reported version and model number, the remote Cisco ASR device is affected by a privilege escalation vulnerability in StarOS in the Command Line Interface (CLI) due to improper sanitization of commands passed to the Linux shell. A local attacker can exploit this, via specially crafted CLI commands, to execute arbitrary shell commands with root privileges.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvc69329 or CSCvc72930.

See Also

Plugin Details

Severity: High

ID: 101528

File Name: cisco-sa-20170705-asrcmd.nasl

Version: 1.4

Type: local

Family: CISCO

Published: 7/13/2017

Updated: 11/12/2019

Dependencies: ssh_get_info.nasl

Risk Information

CVSS Score Source: CVE-2017-6707


Risk Factor: Medium

Score: 6.5


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 8.2

Temporal Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:staros, cpe:/h:cisco:asr_5000, cpe:/h:cisco:asr_5500, cpe:/h:cisco:asr_5700, cpe:/a:cisco:asr_5000_series_software, cpe:/a:cisco:asr_5500_series_software, cpe:/a:cisco:asr_5700_series_software

Required KB Items: Host/Cisco/ASR/Model, Host/Cisco/StarOS

Exploit Ease: No known exploits are available

Patch Publication Date: 7/5/2017

Vulnerability Publication Date: 7/5/2017

Reference Information

CVE: CVE-2017-6707

BID: 99462

CISCO-BUG-ID: CSCvc69329, CSCvc72930

CISCO-SA: cisco-sa-20170705-asrcmd

IAVA: 2017-A-0205