// For flags

CVE-2017-3819

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A privilege escalation vulnerability in the Secure Shell (SSH) subsystem in the StarOS operating system for Cisco ASR 5000 Series, ASR 5500 Series, ASR 5700 Series devices, and Cisco Virtualized Packet Core could allow an authenticated, remote attacker to gain unrestricted, root shell access. The vulnerability is due to missing input validation of parameters passed during SSH or SFTP login. An attacker could exploit this vulnerability by providing crafted user input to the SSH or SFTP command-line interface (CLI) during SSH or SFTP login. An exploit could allow an authenticated attacker to gain root privileges access on the router. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered via both IPv4 and IPv6 traffic. An established TCP connection toward port 22, the SSH default port, is needed to perform the attack. The attacker must have valid credentials to login to the system via SSH or SFTP. The following products have been confirmed to be vulnerable: Cisco ASR 5000/5500/5700 Series devices running StarOS after 17.7.0 and prior to 18.7.4, 19.5, and 20.2.3 with SSH configured are vulnerable. Cisco Virtualized Packet Core - Single Instance (VPC-SI) and Distributed Instance (VPC-DI) devices running StarOS prior to N4.2.7 (19.3.v7) and N4.7 (20.2.v0) with SSH configured are vulnerable. Cisco Bug IDs: CSCva65853.

Una vulnerabilidad de escalada de privilegios en el subsistema Secure Shell (SSH) en el sistema operativo StarOS para dispositivos Cisco ASR 5000 Series, ASR 5500 Series, ASR 5700 Series y Cisco Virtualized Packet Core podrían permitir a un atacante remoto autenticado obtener acceso no restringido al shell del root. La vulnerabilidad se debe a falta de validación de entrada de los parámetros pasados ??durante el inicio de sesión de SSH o SFTP. Un atacante podría explotar esta vulnerabilidad proporcionando una entrada de usuario manipulada a la interfaz de línea de comandos (CLI) de SSH o SFTP durante el inicio de sesión de SSH o SFTP. Una explotación podría permitir a un atacante autenticado obtener acceso privilegiado al root en el router. Nota: Sólo se puede utilizar tráfico dirigido al sistema afectado para explotar esta vulnerabilidad. Esta vulnerabilidad puede ser desencadenada a través de tráfico tanto IPv4 como IPv6. Se necesita una conexión TCP establecida hacia el puerto 22, el puerto por defecto SSH, para realizar el ataque. El atacante debe tener credenciales válidas para iniciar sesión en el sistema a través de SSH o SFTP. Se ha confirmado que los siguientes productos son vulnerables: los dispositivos Cisco ASR 5000/5500/5700 que ejecutan StarOS después de 17.7.0 y anteriores a 18.7.4, 19.5 y 20.2.3 con SSH configurados son vulnerables. Los dispositivos Cisco Virtualized Packet Core - Single Instance (VPC-SI) y Distributed Instrance (VPC-DI) que ejecutan StarOS en versiones anteriores a N4.2.7 (19.3.v7) y N4.7 (20.2.v0) con SSH configurado son vulnerables. ID de errores de Cisco: CSCva65853.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-21 CVE Reserved
  • 2017-03-15 CVE Published
  • 2023-05-11 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-306: Missing Authentication for Critical Function
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.0.0
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.0.0.57828
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.0.0.57828"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.0.0.59167
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.0.0.59167"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.0.0.59211
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.0.0.59211"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.0.l0.59219
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.0.l0.59219"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.1.0
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.1.0"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.1.0.59776
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.1.0.59776"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.1.0.59780
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.1.0.59780"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.1_base
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.1_base"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.3.0
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.3.0"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.3_base
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.3_base"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
18.4.0
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "18.4.0"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
19.0.1
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "19.0.1"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
19.0.m0.60737
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "19.0.m0.60737"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
19.0.m0.60828
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "19.0.m0.60828"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
19.0.m0.61045
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "19.0.m0.61045"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
19.1.0
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "19.1.0"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
19.1.0.61559
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "19.1.0.61559"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
19.2.0
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "19.2.0"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
19.3.0
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "19.3.0"
-
Affected
Cisco
Search vendor "Cisco"
Asr 5000 Series Software
Search vendor "Cisco" for product "Asr 5000 Series Software"
20.0.0
Search vendor "Cisco" for product "Asr 5000 Series Software" and version "20.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Virtualized Packet Core
Search vendor "Cisco" for product "Virtualized Packet Core"
v18.0_base
Search vendor "Cisco" for product "Virtualized Packet Core" and version "v18.0_base"
-
Affected
Cisco
Search vendor "Cisco"
Virtualized Packet Core
Search vendor "Cisco" for product "Virtualized Packet Core"
v19.0_base
Search vendor "Cisco" for product "Virtualized Packet Core" and version "v19.0_base"
-
Affected
Cisco
Search vendor "Cisco"
Virtualized Packet Core
Search vendor "Cisco" for product "Virtualized Packet Core"
v20.0_base
Search vendor "Cisco" for product "Virtualized Packet Core" and version "v20.0_base"
-
Affected