Vulnslist

find the latest Cisco vulnerabilities

Cisco StarOS Privilege Escalation Vulnerability

cisco-sa-staros-priv-esc-gGCUMFxv · Medium · Published · Updated

A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user. To exploit this vulnerability, an attacker would need to have valid administrative credentials on an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-priv-esc-gGCUMFxv

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2020-3601
Cisco Bug IDsCSCvv34214
CVSS ScoreBase 4.4
Base 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco ASR 5000 Series Software

CSAF Product Statuses

Product Status Source CVE Rows
Cisco ASR 5000 Series Software known_affected cisco_csaf CVE-2020-3601 1

Related Products

Product CVE Evidence
Cisco ASR 5000 Series Software CVE-2020-3601 Cisco OpenVuln · family-level