Severity
8.8HIGH
EPSS
0.6%
top 29.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 15
Latest updateMay 13

Description

A privilege escalation vulnerability in the Secure Shell (SSH) subsystem in the StarOS operating system for Cisco ASR 5000 Series, ASR 5500 Series, ASR 5700 Series devices, and Cisco Virtualized Packet Core could allow an authenticated, remote attacker to gain unrestricted, root shell access. The vulnerability is due to missing input validation of parameters passed during SSH or SFTP login. An attacker could exploit this vulnerability by providing crafted user input to the SSH or SFTP command-li

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

NVDcisco/virtualized_packet_corev18.0_base, v19.0_base, v20.0_base+2
NVDcisco/asr_5000_series_software21 versions+20
CVEListV5cisco_starosCisco StarOS

🔴Vulnerability Details

2
GHSA
GHSA-vjhj-68j8-9q56: A privilege escalation vulnerability in the Secure Shell (SSH) subsystem in the StarOS operating system for Cisco ASR 5000 Series, ASR 5500 Series, AS2022-05-13
CVEList
CVE-2017-3819: A privilege escalation vulnerability in the Secure Shell (SSH) subsystem in the StarOS operating system for Cisco ASR 5000 Series, ASR 5500 Series, AS2017-03-15

📋Vendor Advisories

2
Red Hat
kibana: open redirect on the login page2018-01-30
Cisco
Cisco StarOS SSH Privilege Escalation Vulnerability2017-03-15

💬Community

1
Bugzilla
CVE-2018-3819 kibana: open redirect on the login page2018-03-06
CVE-2017-3819 (HIGH CVSS 8.8) | A privilege escalation vulnerabilit | cvebase.io