CVE-2021-1145
Published on: 01/13/2021 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:28:55 PM UTC
CVE-2021-1145 - advisory for cisco-sa-staros-file-read-L3RDvtey
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Asr 5000 from Cisco contain the following vulnerability:
A vulnerability in the Secure FTP (SFTP) of Cisco StarOS for Cisco ASR 5000 Series Routers could allow an authenticated, remote attacker to read arbitrary files on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the affected device. The vulnerability is due to insecure handling of symbolic links. An attacker could exploit this vulnerability by sending a crafted SFTP command to an affected device. A successful exploit could allow the attacker to read arbitrary files on the affected device.
- CVE-2021-1145 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
- Affected Vendor/Software:
Cisco - Cisco ASR 5000 Series Software version n/a
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVSS2 Score: 4 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Cisco StarOS for Cisco ASR 5000 Series Routers Arbitrary File Read Vulnerability | Vendor Advisory tools.cisco.com text/html |
![]() |
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware
| Cisco | Asr 5000 | - | All | All | All |
Hardware
| Cisco | Asr 5000 | - | All | All | All |
Hardware
| Cisco | Asr 5000 | - | All | All | All |
Hardware
| Cisco | Asr 5500 | - | All | All | All |
Hardware
| Cisco | Asr 5500 | - | All | All | All |
Hardware
| Cisco | Asr 5500 | - | All | All | All |
Hardware
| Cisco | Asr 5700 | - | All | All | All |
Hardware
| Cisco | Asr 5700 | - | All | All | All |
Hardware
| Cisco | Asr 5700 | - | All | All | All |
Operating System | Cisco | Staros | All | All | All | All |
Operating System | Cisco | Staros | All | All | All | All |
- cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*: