Vulnerability Description
Multiple vulnerabilities in the authorization process of Cisco ASR 5000 Series Software (StarOS) could allow an authenticated, remote attacker to bypass authorization and execute a subset of CLI commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Staros | < 21.16.9 |
| Cisco | Asr 5000 | - |
| Cisco | Asr 5500 | - |
| Cisco | Asr 5700 | - |
| Cisco | Virtualized Packet Core | - |
Related Weaknesses (CWE)
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aVendor Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aVendor Advisory
FAQ
What is CVE-2021-1540?
CVE-2021-1540 is a vulnerability with a CVSS score of 8.1 (HIGH). Multiple vulnerabilities in the authorization process of Cisco ASR 5000 Series Software (StarOS) could allow an authenticated, remote attacker to bypass authorization and execute a subset of CLI comma...
How severe is CVE-2021-1540?
CVE-2021-1540 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-1540?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Staros, Cisco Asr 5000, Cisco Asr 5500, Cisco Asr 5700, Cisco Virtualized Packet Core.