A vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers could allow an authenticated, local attacker to execute arbitrary commands with root privileges on an affected operating system. The vulnerability is due to insufficient validation of user-supplied input by the affected operating system. An attacker could exploit this vulnerability by authenticating to an affected system and injecting malicious arguments into a vulnerable CLI command. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected system. Cisco Bug IDs: CSCvg38807.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103344 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040466 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-staros1 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2018-03-08 07:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-0224
Mitre link : CVE-2018-0224
CVE.ORG link : CVE-2018-0224
JSON object : View
Products Affected
cisco
- staros
- asr_5700
- asr_5000
- asr_5500