CVE-2016-1335

Severity

71%

Complexity

39%

Confidentiality

165%

The SSH implementation in Cisco StarOS before 19.3.M0.62771 and 20.x before 20.0.M0.62768 on ASR 5000 devices mishandles a multi-user public-key authentication configuration, which allows remote authenticated users to gain privileges by establishing a connection from an endpoint that was previously used for an administrator's connection, aka Bug ID CSCux22492.

The SSH implementation in Cisco StarOS before 19.3.M0.62771 and 20.x before 20.0.M0.62768 on ASR 5000 devices mishandles a multi-user public-key authentication configuration, which allows remote authenticated users to gain privileges by establishing a connection from an endpoint that was previously used for an administrator's connection, aka Bug ID CSCux22492.

CVSS 3.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 7.1. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (AV:N/AC:H/Au:S/C:C/I:C/A:C).

Overview

Type

Cisco ASR 5000 Series Software

First reported 9 years ago

2016-02-19 19:59:00

Last updated 8 years ago

2016-08-04 18:21:00

Affected Software

Cisco ASR 5000 Series Software 16.5.2

16.5.2

Cisco ASR 5000 Series Software 17.7.0

17.7.0

Cisco ASR 5000 Series Software 18.4.0

18.4.0

Cisco ASR 5000 Series Software 19.0.1

19.0.1

Cisco ASR 5000 Series Software 19.3.0

19.3.0

Cisco ASR 5000 Series Software 20.0.0

20.0.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.