ID

VAR-201602-0067


CVE

CVE-2016-1335


TITLE

Cisco ASR 5000 Run on device StarOS of SSH Vulnerabilities that can gain privileges in implementation

Trust: 0.8

sources: JVNDB: JVNDB-2016-001712

DESCRIPTION

The SSH implementation in Cisco StarOS before 19.3.M0.62771 and 20.x before 20.0.M0.62768 on ASR 5000 devices mishandles a multi-user public-key authentication configuration, which allows remote authenticated users to gain privileges by establishing a connection from an endpoint that was previously used for an administrator's connection, aka Bug ID CSCux22492. Cisco ASR 5000 Run on device StarOS of SSH Because the implementation incorrectly handles multi-user public key authentication settings, there is a vulnerability that can be obtained. The CiscoStarOSonASR5000 is an operating system operated by Cisco Systems Inc. in the 5000 series routers. The vulnerability stems from the fact that the program does not properly handle multi-user public-key authentication configuration

Trust: 2.34

sources: NVD: CVE-2016-1335 // JVNDB: JVNDB-2016-001712 // CNVD: CNVD-2016-01313 // VULHUB: VHN-90154 // VULMON: CVE-2016-1335

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-01313

AFFECTED PRODUCTS

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.0

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:16.5.2

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:19.0.1

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:19.3.0

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:17.7.0

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:18.4.0

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.m0.62768

Trust: 0.8

vendor:ciscomodel:asr 5000 series softwarescope:ltversion:20.x

Trust: 0.8

vendor:ciscomodel:staros on asr 19.3.m0.62771scope:eqversion:5000<

Trust: 0.6

vendor:ciscomodel:staros on asr 20.0.m0.62768scope:eqversion:5000<

Trust: 0.6

sources: CNVD: CNVD-2016-01313 // JVNDB: JVNDB-2016-001712 // CNNVD: CNNVD-201602-390 // NVD: CVE-2016-1335

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1335
value: HIGH

Trust: 1.0

NVD: CVE-2016-1335
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-01313
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201602-390
value: HIGH

Trust: 0.6

VULHUB: VHN-90154
value: HIGH

Trust: 0.1

VULMON: CVE-2016-1335
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1335
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-01313
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90154
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1335
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-01313 // VULHUB: VHN-90154 // VULMON: CVE-2016-1335 // JVNDB: JVNDB-2016-001712 // CNNVD: CNNVD-201602-390 // NVD: CVE-2016-1335

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-90154 // JVNDB: JVNDB-2016-001712 // NVD: CVE-2016-1335

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201602-390

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201602-390

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001712

PATCH

title:cisco-sa-20160218-asrurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-asr

Trust: 0.8

title:Patch for CiscoStarOS Privilege Escalation Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/71920

Trust: 0.6

title:Cisco ASR 5000 StarOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60287

Trust: 0.6

title:Cisco: Cisco ASR 5000 Series StarOS SSH Subsystem Privilege Escalation Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160218-asr

Trust: 0.1

sources: CNVD: CNVD-2016-01313 // VULMON: CVE-2016-1335 // JVNDB: JVNDB-2016-001712 // CNNVD: CNNVD-201602-390

EXTERNAL IDS

db:NVDid:CVE-2016-1335

Trust: 3.2

db:SECTRACKid:1035062

Trust: 1.2

db:JVNDBid:JVNDB-2016-001712

Trust: 0.8

db:CNNVDid:CNNVD-201602-390

Trust: 0.7

db:BIDid:83304

Trust: 0.6

db:CNVDid:CNVD-2016-01313

Trust: 0.6

db:VULHUBid:VHN-90154

Trust: 0.1

db:VULMONid:CVE-2016-1335

Trust: 0.1

sources: CNVD: CNVD-2016-01313 // VULHUB: VHN-90154 // VULMON: CVE-2016-1335 // JVNDB: JVNDB-2016-001712 // CNNVD: CNNVD-201602-390 // NVD: CVE-2016-1335

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160218-asr

Trust: 2.5

url:http://www.securitytracker.com/id/1035062

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1335

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1335

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2016-01313 // VULHUB: VHN-90154 // VULMON: CVE-2016-1335 // JVNDB: JVNDB-2016-001712 // CNNVD: CNNVD-201602-390 // NVD: CVE-2016-1335

SOURCES

db:CNVDid:CNVD-2016-01313
db:VULHUBid:VHN-90154
db:VULMONid:CVE-2016-1335
db:JVNDBid:JVNDB-2016-001712
db:CNNVDid:CNNVD-201602-390
db:NVDid:CVE-2016-1335

LAST UPDATE DATE

2024-11-23T22:42:21.645000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01313date:2016-02-26T00:00:00
db:VULHUBid:VHN-90154date:2016-08-04T00:00:00
db:VULMONid:CVE-2016-1335date:2016-08-04T00:00:00
db:JVNDBid:JVNDB-2016-001712date:2016-03-15T00:00:00
db:CNNVDid:CNNVD-201602-390date:2016-02-22T00:00:00
db:NVDid:CVE-2016-1335date:2024-11-21T02:46:12.437

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-01313date:2016-02-26T00:00:00
db:VULHUBid:VHN-90154date:2016-02-19T00:00:00
db:VULMONid:CVE-2016-1335date:2016-02-19T00:00:00
db:JVNDBid:JVNDB-2016-001712date:2016-03-15T00:00:00
db:CNNVDid:CNNVD-201602-390date:2016-02-22T00:00:00
db:NVDid:CVE-2016-1335date:2016-02-19T19:59:03.157