2025-01-26 03:03:52 +00:00

201 lines
6.9 KiB
JSON

{
"id": "CVE-2023-20046",
"sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-09T18:15:11.697",
"lastModified": "2024-11-21T07:40:25.733",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.\r\n\r There are workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-289"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.22.14",
"matchCriteriaId": "1280E939-FA8A-49E4-AE06-616B152929CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.23.0",
"versionEndExcluding": "21.23.31",
"matchCriteriaId": "5A2C7A63-E17A-487D-8CCF-3346FDA2859F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.25.0",
"versionEndExcluding": "21.25.15",
"matchCriteriaId": "1B58A574-77D9-4EC5-9D57-8D244EF7BDB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.26.0",
"versionEndExcluding": "21.26.17",
"matchCriteriaId": "E9507CCB-0340-40D6-AAF3-D2EA3D3EE408"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.27.0",
"versionEndExcluding": "21.27.6",
"matchCriteriaId": "0D9F9D50-DA13-410A-9571-6FA9436165E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.28.0",
"versionEndExcluding": "21.28.3",
"matchCriteriaId": "833F9A52-2976-4F2C-AA87-FD50BB83BB3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:21.23.n:*:*:*:*:*:*:*",
"matchCriteriaId": "CD63EE8D-0389-4589-BF86-0F64A8AEDA13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:21.24:*:*:*:*:*:*:*",
"matchCriteriaId": "A0534E44-1CD6-49CB-A574-D7B2CF14CC25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:21.27.m:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1BBD53-BF16-4841-9D20-D2C4129A337B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:21.28.m:*:*:*:*:*:*:*",
"matchCriteriaId": "47DCE4FD-48D4-4B25-BBAE-24D270627FCD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "746254AC-B039-432C-AA5C-A82260E57AD7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "301681DF-2A9E-4A91-9918-4A46153ADC01"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9EF0299-16A7-446D-855D-BFF91EE65534"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vpc-di:-:*:*:*:*:*:*:*",
"matchCriteriaId": "775B2FC4-E182-47F8-B786-EC6A359BCCE3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vpc-si:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFD5A5BE-9B00-4E4F-A4A4-FBEF990F4C39"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h",
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}