Learn about CVE-2017-6707 affecting Cisco StarOS, allowing local attackers to execute shell commands as root users. Find mitigation steps and patching details here.
A security flaw has been discovered in the Cisco StarOS operating system for Cisco ASR 5000 Series 11.0 through 21.0, 5500 Series, and 5700 Series devices, as well as Cisco Virtualized Packet Core (VPC) Software, allowing a local attacker to execute unrestricted shell commands as a Linux root user.
Understanding CVE-2017-6707
This CVE involves a vulnerability in the CLI command-parsing code of Cisco StarOS, enabling an authenticated attacker to escape the StarOS CLI and run arbitrary shell commands as a root user.
What is CVE-2017-6707?
The vulnerability in Cisco StarOS allows a local attacker to break out of the CLI and execute Linux shell commands as a root user, known as Command Injection. The flaw arises from inadequate command sanitization.
The Impact of CVE-2017-6707
The vulnerability permits a malicious authenticated user to run unauthorized shell commands as a Linux root user on the affected system, potentially leading to system compromise and unauthorized access.
Technical Details of CVE-2017-6707
This section provides detailed technical information about the CVE.
Vulnerability Description
The flaw in Cisco StarOS allows an authenticated attacker to escape the CLI and execute arbitrary shell commands as a Linux root user due to insufficient command sanitization.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect your systems from CVE-2017-6707 with the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates