Cisco ASR StarOS CLI Command Injection Local Privilege Escalation (cisco-sa-20170705-asrcmd)

high Nessus Plugin ID 101528

Synopsis

The remote device is affected by a privilege escalation vulnerability.

Description

According to its self-reported version and model number, the remote Cisco ASR device is affected by a privilege escalation vulnerability in StarOS in the Command Line Interface (CLI) due to improper sanitization of commands passed to the Linux shell. A local attacker can exploit this, via specially crafted CLI commands, to execute arbitrary shell commands with root privileges.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvc69329 or CSCvc72930.

See Also

http://www.nessus.org/u?e199024c

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc69329

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc72930

Plugin Details

Severity: High

ID: 101528

File Name: cisco-sa-20170705-asrcmd.nasl

Version: 1.4

Type: local

Family: CISCO

Published: 7/13/2017

Updated: 11/12/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-6707

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:staros, cpe:/h:cisco:asr_5000, cpe:/h:cisco:asr_5500, cpe:/h:cisco:asr_5700, cpe:/a:cisco:asr_5000_series_software, cpe:/a:cisco:asr_5500_series_software, cpe:/a:cisco:asr_5700_series_software

Required KB Items: Host/Cisco/ASR/Model, Host/Cisco/StarOS

Exploit Ease: No known exploits are available

Patch Publication Date: 7/5/2017

Vulnerability Publication Date: 7/5/2017

Reference Information

CVE: CVE-2017-6707

BID: 99462

CISCO-SA: cisco-sa-20170705-asrcmd

IAVA: 2017-A-0205

CISCO-BUG-ID: CSCvc69329, CSCvc72930