copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2016.0418 - [Cisco] Cisco ASR 5000 Series StarOS: Increased privileges - Remote/unauthenticated

Date: 19 February 2016

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0418
           Cisco ASR 5000 Series StarOS SSH Subsystem Privilege
                         Escalation Vulnerability
                             19 February 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco ASR 5000 Series StarOS
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Increased Privileges -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-1335  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-asr

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Security Advisory

Cisco ASR 5000 Series StarOS SSH Subsystem Privilege Escalation Vulnerability

Medium
Advisory ID:
cisco-sa-20160218-asr

Published:
2016 February 18 23:20  GMT

Version 1.0:
Final

CVSS Score:
Base - 7.1

Workarounds:
No workarounds available

Cisco Bug IDs:
CSCux22492
CVE-2016-1335
CWE-264

Summary

    A privilege escalation vulnerability in the SSH subsystem in Cisco ASR 5000
    Series devices running StarOS could allow an authenticated, remote attacker
    to elevate privileges. The attacker would need to have a valid and 
    configured SSH authorized key and access to the same device from which the
    privileged administrator connects.
     
    The vulnerability is due to an error that occurs when multiple users are
    configured to use SSH keys as the authentication mechanism. Administrative
    accounts configured in this manner are tied to a single remote device. 
    A successful attack could allow a lower-privileged user to authenticate as
    a higher-privileged administrator if all constraints can be met.

    Cisco has released software updates that address this vulnerability. 
    Workarounds that address this vulnerability are not available.

    This advisory is available at the following link: 
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-asr

Affected Products

    Vulnerable Products

    Cisco ASR 5000 devices running StarOS prior to 19.3.M0.62771 and prior to
    20.0.M0.62768 are vulnerable.

    Products Confirmed Not Vulnerable
    No other Cisco products are currently known to be affected by this
    vulnerability.

Workarounds

    Workarounds are not available.

Fixed Software

    When considering software upgrades, customers are advised to consult the 
    Cisco Security Advisories and Responses archive at
    http://www.cisco.com/go/psirt and review subsequent advisories to determine
    exposure and a complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded 
    contain sufficient memory and confirm that current hardware and software 
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco 
    Technical Assistance Center (TAC) or their contracted maintenance 
    providers.

Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not aware of 
    any public announcements or malicious use of the vulnerability that is 
    described in this advisory.

URL

    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-asr

Revision History

    Version 	Description 		Section 	Status 	Date
    1.0 	Initial public release 	-	 	Final 	2016-February-18

Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND 
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR 
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR
    MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE 
    RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the 
    distribution URL is an uncontrolled copy and may lack important information 
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=l0Mx
-----END PGP SIGNATURE-----