{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T18:13:06.586","vulnerabilities":[{"cve":{"id":"CVE-2023-20046","sourceIdentifier":"psirt@cisco.com","published":"2023-05-09T18:15:11.697","lastModified":"2024-11-21T07:40:25.733","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.\r\n\r   There are workarounds that address this vulnerability."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-289"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*","versionEndExcluding":"21.22.14","matchCriteriaId":"1280E939-FA8A-49E4-AE06-616B152929CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*","versionStartIncluding":"21.23.0","versionEndExcluding":"21.23.31","matchCriteriaId":"5A2C7A63-E17A-487D-8CCF-3346FDA2859F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*","versionStartIncluding":"21.25.0","versionEndExcluding":"21.25.15","matchCriteriaId":"1B58A574-77D9-4EC5-9D57-8D244EF7BDB8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*","versionStartIncluding":"21.26.0","versionEndExcluding":"21.26.17","matchCriteriaId":"E9507CCB-0340-40D6-AAF3-D2EA3D3EE408"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*","versionStartIncluding":"21.27.0","versionEndExcluding":"21.27.6","matchCriteriaId":"0D9F9D50-DA13-410A-9571-6FA9436165E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*","versionStartIncluding":"21.28.0","versionEndExcluding":"21.28.3","matchCriteriaId":"833F9A52-2976-4F2C-AA87-FD50BB83BB3D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:21.23.n:*:*:*:*:*:*:*","matchCriteriaId":"CD63EE8D-0389-4589-BF86-0F64A8AEDA13"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:21.24:*:*:*:*:*:*:*","matchCriteriaId":"A0534E44-1CD6-49CB-A574-D7B2CF14CC25"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:21.27.m:*:*:*:*:*:*:*","matchCriteriaId":"CC1BBD53-BF16-4841-9D20-D2C4129A337B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:staros:21.28.m:*:*:*:*:*:*:*","matchCriteriaId":"47DCE4FD-48D4-4B25-BBAE-24D270627FCD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*","matchCriteriaId":"746254AC-B039-432C-AA5C-A82260E57AD7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*","matchCriteriaId":"301681DF-2A9E-4A91-9918-4A46153ADC01"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*","matchCriteriaId":"A9EF0299-16A7-446D-855D-BFF91EE65534"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vpc-di:-:*:*:*:*:*:*:*","matchCriteriaId":"775B2FC4-E182-47F8-B786-EC6A359BCCE3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vpc-si:-:*:*:*:*:*:*:*","matchCriteriaId":"DFD5A5BE-9B00-4E4F-A4A4-FBEF990F4C39"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}