Vulnslist

find the latest Cisco vulnerabilities

Cisco StarOS Privilege Escalation Vulnerability

cisco-sa-staros-privilege-esc-pyb7YTd · Medium · Published · Updated

A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user on the affected device. To exploit this vulnerability, an attacker would need to have valid credentials on an affected device and know the password for the cli test-commands command. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-privilege-esc-pyb7YTd

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2020-3602
Cisco Bug IDsCSCvv34222
CVSS ScoreBase 6.3
Base 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco ASR 5000 Series Software

CSAF Product Statuses

Product Status Source CVE Rows
Cisco ASR 5000 Series Software known_affected cisco_csaf CVE-2020-3602 1

Related Products

Product CVE Evidence
Cisco ASR 5000 Series Software CVE-2020-3602 Cisco OpenVuln · family-level