7.1
CVSSv2

CVE-2016-1335

Published: 19/02/2016 Updated: 04/08/2016
CVSS v2 Base Score: 7.1 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 632
Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C

Vulnerability Summary

The SSH implementation in Cisco StarOS prior to 19.3.M0.62771 and 20.x prior to 20.0.M0.62768 on ASR 5000 devices mishandles a multi-user public-key authentication configuration, which allows remote authenticated users to gain privileges by establishing a connection from an endpoint that was previously used for an administrator's connection, aka Bug ID CSCux22492.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco asr 5000 series software 20.0.0

cisco asr 5000 series software 16.5.2

cisco asr 5000 series software 19.3.0

cisco asr 5000 series software 19.0.1

cisco asr 5000 series software 18.4.0

cisco asr 5000 series software 17.7.0

Vendor Advisories

A privilege escalation vulnerability in the SSH subsystem in Cisco ASR 5000 Series devices running StarOS could allow an authenticated, remote attacker to elevate privileges The attacker would need to have a valid and configured SSH authorized key and access to the same device from which the privileged administrator connects The vulnerability i ...