CVE-2023-20046

Severity CVSS v4.0:
Pending analysis
Type:
CWE-522 Insufficiently Protected Credentials
Publication date:
09/05/2023
Last modified:
25/01/2024

Description

A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.<br /> <br /> This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.<br /> <br /> There are workarounds that address this vulnerability.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* 21.22.14 (excluding)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* 21.23.0 (including) 21.23.31 (excluding)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* 21.25.0 (including) 21.25.15 (excluding)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* 21.26.0 (including) 21.26.17 (excluding)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* 21.27.0 (including) 21.27.6 (excluding)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* 21.28.0 (including) 21.28.3 (excluding)
cpe:2.3:o:cisco:staros:21.23.n:*:*:*:*:*:*:*
cpe:2.3:o:cisco:staros:21.24:*:*:*:*:*:*:*
cpe:2.3:o:cisco:staros:21.27.m:*:*:*:*:*:*:*
cpe:2.3:o:cisco:staros:21.28.m:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vpc-di:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vpc-si:-:*:*:*:*:*:*:*