CVE-2023-20046
Severity CVSS v4.0:
Pending analysis
Type:
CWE-522
Insufficiently Protected Credentials
Publication date:
09/05/2023
Last modified:
25/01/2024
Description
A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.<br />
<br />
This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.<br />
<br />
There are workarounds that address this vulnerability.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* | 21.22.14 (excluding) | |
| cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* | 21.23.0 (including) | 21.23.31 (excluding) |
| cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* | 21.25.0 (including) | 21.25.15 (excluding) |
| cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* | 21.26.0 (including) | 21.26.17 (excluding) |
| cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* | 21.27.0 (including) | 21.27.6 (excluding) |
| cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:* | 21.28.0 (including) | 21.28.3 (excluding) |
| cpe:2.3:o:cisco:staros:21.23.n:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:staros:21.24:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:staros:21.27.m:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:staros:21.28.m:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:vpc-di:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:vpc-si:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



