Cisco Security Advisory - Cisco StarOS Command Injection Vulnerability

Started by Netwörkheäd, April 04, 2022, 06:15:50 PM

Previous topic - Next topic

Netwörkheäd

Cisco StarOS Command Injection Vulnerability

<p>A vulnerability in the CLI of Cisco&nbsp;StarOS could allow an authenticated, local attacker to elevate privileges on an affected device.</p>
<p>This vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the <em>root</em> user. To exploit this vulnerability, an attacker would need to have valid administrative credentials on an affected device.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-cmdinj-759mNT4n" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-cmdinj-759mNT4n</a></p>

     
         
Security Impact Rating:  Medium
   
   
       
CVE: CVE-2022-20665
Source: Cisco StarOS Command Injection Vulnerability
Let's not argue. Let's network!