Skip to content

Cisco StarOS - SSH vulnerability (CVE-2023-20046)

High
orange-cert-cc published GHSA-j7p3-gjw6-pp4r Apr 20, 2023

Package

StarOS (Cisco)

Affected versions

R21.22
R21.27
R21.28

Patched versions

21.22.14
21.27.6
21.28.3

Description

Overview

From GGSN/SPGW mobile core network device, running on StarOS, an attacker with a account allowed to connect to device through a valid SSH key could connect to any user account defined with SSH key authentication method.

Details

Knowning a user with high-privilege allowed to connect to the device via SSH Key method, a low privilege user could gain privilege access to the affected device.

Affected versions

GGSN / SPGW on mobile core network

  • ASR5000: R21.22, R21.27
  • vPoP: R21.22, R21.28

Proof of Concept

See the figure

1- Theft of SSH key of a user (with low-privilege) allowed to connect to the device
2- Known a user (with high-privilege) allowed to connect to the device via SSH Key method
2- Launch SSH connection as usurped user account using SSH key low-privilege

Solution

Security patch

Upgrade to patched Cisco StarOS release, as described in Cisco Security Advisory

References

https://nvd.nist.gov/vuln/detail/CVE-2023-20046
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h

Credits

Orange CERT-CC
Adrien MOURIER at Orange group

Timeline

Date reported: December 15, 2022
Date fixed: April 19, 2023

Severity

High
8.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2023-20046

Weaknesses

No CWEs