Cisco ASR StarOS CLI Command Injection Local Privilege Escalation (cisco-sa-20170705-asrcmd)

High Nessus Plugin ID 101528

Synopsis

The remote device is affected by a privilege escalation vulnerability.

Description

According to its self-reported version and model number, the remote Cisco ASR device is affected by a privilege escalation vulnerability in StarOS in the Command Line Interface (CLI) due to improper sanitization of commands passed to the Linux shell. A local attacker can exploit this, via specially crafted CLI commands, to execute arbitrary shell commands with root privileges.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvc69329 or CSCvc72930.

See Also

http://www.nessus.org/u?e199024c

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc69329

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc72930

Plugin Details

Severity: High

ID: 101528

File Name: cisco-sa-20170705-asrcmd.nasl

Version: 1.4

Type: local

Family: CISCO

Published: 2017/07/13

Updated: 2019/11/12

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2017-6707

CVSS v2.0

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.2

Temporal Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:staros, cpe:/h:cisco:asr_5000, cpe:/h:cisco:asr_5500, cpe:/h:cisco:asr_5700, cpe:/a:cisco:asr_5000_series_software, cpe:/a:cisco:asr_5500_series_software, cpe:/a:cisco:asr_5700_series_software

Required KB Items: Host/Cisco/ASR/Model, Host/Cisco/StarOS

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/07/05

Vulnerability Publication Date: 2017/07/05

Reference Information

CVE: CVE-2017-6707

BID: 99462

CISCO-BUG-ID: CSCvc69329, CSCvc72930

CISCO-SA: cisco-sa-20170705-asrcmd

IAVA: 2017-A-0205