Cisco StarOS 21.25.0

CPE Details

Cisco StarOS 21.25.0
21.25.0
2023-05-16
15h41 +00:00
2023-07-21
21h05 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:cisco:staros:21.25.0:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

staros

Version

21.25.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-20046 2023-05-09 13h06 +00:00 A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user. There are workarounds that address this vulnerability.
8.8
High
CVE-2018-0115 2018-01-18 05h00 +00:00 A vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series routers could allow an authenticated, local attacker to execute arbitrary commands with root privileges on an affected host operating system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting malicious command arguments into a vulnerable CLI command. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. To exploit this vulnerability, the attacker would need to authenticate to the affected system by using valid administrator credentials. Cisco Bug IDs: CSCvf93332.
6.7
Medium