Total vulnerabilities in the database
A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.
This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.
There are workarounds that address this vulnerability.
Software | From | Fixed in |
---|---|---|
cisco / staros | - | 21.22.14 |
cisco / staros | 21.23.0 | 21.23.31 |
cisco / staros | 21.25.0 | 21.25.15 |
cisco / staros | 21.26.0 | 21.26.17 |
cisco / staros | 21.27.0 | 21.27.6 |
cisco / staros | 21.28.0 | 21.28.3 |
cisco / staros | 21.23.n | 21.23.n.x |
cisco / staros | 21.24 | 21.24.x |
cisco / staros | 21.27.m | 21.27.m.x |
cisco / staros | 21.28.m | 21.28.m.x |