CVE-2022-20655 (GCVE-0-2022-20655)
Vulnerability from cvelistv5 – Published: 2024-11-15 15:56 – Updated: 2024-11-15 21:00
VLAI?
Summary
A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.
The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.
Severity ?
8.8 (High)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Affected:
N/A
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:cisco:ios_xr_software:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ios_xr_software",
"vendor": "cisco",
"versions": [
{
"lessThan": "7.0.2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.1.1",
"status": "affected",
"version": "7.1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "virtual_topology_system",
"vendor": "cisco",
"versions": [
{
"lessThan": "2.6.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "network_services_orchestrator",
"vendor": "cisco",
"versions": [
{
"lessThan": "4.3.9.1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "4.4.5.6",
"status": "affected",
"version": "4.4.0.0",
"versionType": "custom"
},
{
"lessThan": "4.5.7",
"status": "affected",
"version": "4.5.0",
"versionType": "custom"
},
{
"lessThan": "4.6.1.7",
"status": "affected",
"version": "4.6.0",
"versionType": "custom"
},
{
"lessThan": "4.7.1",
"status": "affected",
"version": "4.7.0",
"versionType": "custom"
},
{
"lessThan": "5.1.0.1",
"status": "affected",
"version": "5.1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "enterprise_nfv_infrastructure_software",
"vendor": "cisco",
"versions": [
{
"lessThan": "3.12.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "catalyst_sd-wan_manager",
"vendor": "cisco",
"versions": [
{
"lessThan": "18.4.4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "19.2.1",
"status": "affected",
"version": "19.2.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ios_xe_catalyst_sd-wan",
"vendor": "cisco",
"versions": [
{
"lessThan": "16.10.2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "16.12.1b",
"status": "affected",
"version": "16.12.0",
"versionType": "custom"
},
{
"lessThan": "17.2.1r",
"status": "affected",
"version": "17.2.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sd-wan_vedge_router",
"vendor": "cisco",
"versions": [
{
"lessThan": "18.4.4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "19.2.1",
"status": "affected",
"version": "19.2.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:carrier_packet_transport:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "carrier_packet_transport",
"vendor": "cisco",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-20655",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T19:43:18.170598Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T21:00:58.460Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Virtual Topology System (VTS)",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Network Services Orchestrator",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Enterprise NFV Infrastructure Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Catalyst SD-WAN",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Catalyst SD-WAN Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco IOS XE Catalyst SD-WAN",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco SD-WAN vEdge Router",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Ultra Gateway Platform",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Carrier Packet Transport",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.5"
},
{
"status": "affected",
"version": "3.1"
},
{
"status": "affected",
"version": "3.2"
},
{
"status": "affected",
"version": "2.5"
},
{
"status": "affected",
"version": "2.0"
},
{
"status": "affected",
"version": "9.2.2"
},
{
"status": "affected",
"version": "1.4.0"
},
{
"status": "affected",
"version": "1.0"
},
{
"status": "affected",
"version": "1.1"
},
{
"status": "affected",
"version": "1.2"
},
{
"status": "affected",
"version": "2.1.0"
},
{
"status": "affected",
"version": "2.3.0"
},
{
"status": "affected",
"version": "2.3.3"
},
{
"status": "affected",
"version": "2.3.5"
},
{
"status": "affected",
"version": "2.3.4"
},
{
"status": "affected",
"version": "2.0.1"
},
{
"status": "affected",
"version": "2.0.0"
},
{
"status": "affected",
"version": "2.0.3"
},
{
"status": "affected",
"version": "2.0.4"
},
{
"status": "affected",
"version": "2.0.5"
},
{
"status": "affected",
"version": "2.4.0"
},
{
"status": "affected",
"version": "2.2.2"
},
{
"status": "affected",
"version": "2.2.3"
},
{
"status": "affected",
"version": "10.8.0"
},
{
"status": "affected",
"version": "7.0.3"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "1.0.2"
},
{
"status": "affected",
"version": "1.1.1"
},
{
"status": "affected",
"version": "1.1.2"
},
{
"status": "affected",
"version": "4.1"
},
{
"status": "affected",
"version": "4.0"
},
{
"status": "affected",
"version": "12.1.0"
},
{
"status": "affected",
"version": "9.8.1"
},
{
"status": "affected",
"version": "9.8.0"
},
{
"status": "affected",
"version": "4.1.82"
},
{
"status": "affected",
"version": "4.1.4"
},
{
"status": "affected",
"version": "4.6.1"
},
{
"status": "affected",
"version": "4.0.4"
},
{
"status": "affected",
"version": "4.0.3"
},
{
"status": "affected",
"version": "6.2.4"
},
{
"status": "affected",
"version": "3.0.5"
},
{
"status": "affected",
"version": "3.0.6"
},
{
"status": "affected",
"version": "3.0.7"
},
{
"status": "affected",
"version": "3.0.3"
},
{
"status": "affected",
"version": "3.0.0"
},
{
"status": "affected",
"version": "9.5.0"
},
{
"status": "affected",
"version": "9.5.3"
},
{
"status": "affected",
"version": "9.5.1"
},
{
"status": "affected",
"version": "9.5.2"
},
{
"status": "affected",
"version": "9.7.0"
},
{
"status": "affected",
"version": "9.521"
},
{
"status": "affected",
"version": "4.5.0"
},
{
"status": "affected",
"version": "4.7.0"
},
{
"status": "affected",
"version": "3.2.0"
},
{
"status": "affected",
"version": "3.2.1"
},
{
"status": "affected",
"version": "3.1.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\r\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:56:42.927Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-cli-cmdinj-4MttWZPB",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB"
},
{
"name": "cisco-sa-confdcli-cmdinj-wybQDSSh",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh"
}
],
"source": {
"advisory": "cisco-sa-cli-cmdinj-4MttWZPB",
"defects": [
"CSCvq22323",
"CSCvq58164",
"CSCvq58224",
"CSCvq58168",
"CSCvq58183",
"CSCvq58226",
"CSCvz49669",
"CSCvq58204",
"CSCvm76596"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2022-20655",
"datePublished": "2024-11-15T15:56:42.927Z",
"dateReserved": "2021-11-02T13:28:29.037Z",
"dateUpdated": "2024-11-15T21:00:58.460Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\\r\\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la implementaci\\u00f3n de la CLI en un dispositivo que ejecuta ConfD podr\\u00eda permitir que un atacante local autenticado realice un ataque de inyecci\\u00f3n de comandos. La vulnerabilidad se debe a una validaci\\u00f3n insuficiente de un argumento de proceso en un dispositivo afectado. Un atacante podr\\u00eda explotar esta vulnerabilidad inyectando comandos durante la ejecuci\\u00f3n de este proceso. Una explotaci\\u00f3n exitosa podr\\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con el nivel de privilegio de ConfD, que normalmente es superusuario.\"}]",
"id": "CVE-2022-20655",
"lastModified": "2024-11-18T17:11:56.587",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 6.0}]}",
"published": "2024-11-15T16:15:20.987",
"references": "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh\", \"source\": \"ykramarz@cisco.com\"}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-20655\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-11-15T16:15:20.987\",\"lastModified\":\"2024-11-18T17:11:56.587\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\\r\\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la implementaci\u00f3n de la CLI en un dispositivo que ejecuta ConfD podr\u00eda permitir que un atacante local autenticado realice un ataque de inyecci\u00f3n de comandos. La vulnerabilidad se debe a una validaci\u00f3n insuficiente de un argumento de proceso en un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad inyectando comandos durante la ejecuci\u00f3n de este proceso. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con el nivel de privilegio de ConfD, que normalmente es superusuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh\",\"source\":\"psirt@cisco.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-20655\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-15T19:43:18.170598Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:cisco:ios_xr_software:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"ios_xr_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.0.2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"7.1.0\", \"lessThan\": \"7.1.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"virtual_topology_system\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2.6.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"network_services_orchestrator\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"4.3.9.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.4.0.0\", \"lessThan\": \"4.4.5.6\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.5.0\", \"lessThan\": \"4.5.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.6.0\", \"lessThan\": \"4.6.1.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.7.0\", \"lessThan\": \"4.7.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"5.1.0\", \"lessThan\": \"5.1.0.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"enterprise_nfv_infrastructure_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.12.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"catalyst_sd-wan_manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"18.4.4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"19.2.0\", \"lessThan\": \"19.2.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"ios_xe_catalyst_sd-wan\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"16.10.2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"16.12.0\", \"lessThan\": \"16.12.1b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"17.2.0\", \"lessThan\": \"17.2.1r\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"sd-wan_vedge_router\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"18.4.4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"19.2.0\", \"lessThan\": \"19.2.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:carrier_packet_transport:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"carrier_packet_transport\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-15T21:00:40.999Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCvq22323\", \"CSCvq58164\", \"CSCvq58224\", \"CSCvq58168\", \"CSCvq58183\", \"CSCvq58226\", \"CSCvz49669\", \"CSCvq58204\", \"CSCvm76596\"], \"advisory\": \"cisco-sa-cli-cmdinj-4MttWZPB\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS XR Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Virtual Topology System (VTS)\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Network Services Orchestrator\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Enterprise NFV Infrastructure Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Catalyst SD-WAN\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Catalyst SD-WAN Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco IOS XE Catalyst SD-WAN\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco SD-WAN vEdge Router\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Ultra Gateway Platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Carrier Packet Transport\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.5\"}, {\"status\": \"affected\", \"version\": \"3.1\"}, {\"status\": \"affected\", \"version\": \"3.2\"}, {\"status\": \"affected\", \"version\": \"2.5\"}, {\"status\": \"affected\", \"version\": \"2.0\"}, {\"status\": \"affected\", \"version\": \"9.2.2\"}, {\"status\": \"affected\", \"version\": \"1.4.0\"}, {\"status\": \"affected\", \"version\": \"1.0\"}, {\"status\": \"affected\", \"version\": \"1.1\"}, {\"status\": \"affected\", \"version\": \"1.2\"}, {\"status\": \"affected\", \"version\": \"2.1.0\"}, {\"status\": \"affected\", \"version\": \"2.3.0\"}, {\"status\": \"affected\", \"version\": \"2.3.3\"}, {\"status\": \"affected\", \"version\": \"2.3.5\"}, {\"status\": \"affected\", \"version\": \"2.3.4\"}, {\"status\": \"affected\", \"version\": \"2.0.1\"}, {\"status\": \"affected\", \"version\": \"2.0.0\"}, {\"status\": \"affected\", \"version\": \"2.0.3\"}, {\"status\": \"affected\", \"version\": \"2.0.4\"}, {\"status\": \"affected\", \"version\": \"2.0.5\"}, {\"status\": \"affected\", \"version\": \"2.4.0\"}, {\"status\": \"affected\", \"version\": \"2.2.2\"}, {\"status\": \"affected\", \"version\": \"2.2.3\"}, {\"status\": \"affected\", \"version\": \"10.8.0\"}, {\"status\": \"affected\", \"version\": \"7.0.3\"}, {\"status\": \"affected\", \"version\": \"7.0.1\"}, {\"status\": \"affected\", \"version\": \"1.0.2\"}, {\"status\": \"affected\", \"version\": \"1.1.1\"}, {\"status\": \"affected\", \"version\": \"1.1.2\"}, {\"status\": \"affected\", \"version\": \"4.1\"}, {\"status\": \"affected\", \"version\": \"4.0\"}, {\"status\": \"affected\", \"version\": \"12.1.0\"}, {\"status\": \"affected\", \"version\": \"9.8.1\"}, {\"status\": \"affected\", \"version\": \"9.8.0\"}, {\"status\": \"affected\", \"version\": \"4.1.82\"}, {\"status\": \"affected\", \"version\": \"4.1.4\"}, {\"status\": \"affected\", \"version\": \"4.6.1\"}, {\"status\": \"affected\", \"version\": \"4.0.4\"}, {\"status\": \"affected\", \"version\": \"4.0.3\"}, {\"status\": \"affected\", \"version\": \"6.2.4\"}, {\"status\": \"affected\", \"version\": \"3.0.5\"}, {\"status\": \"affected\", \"version\": \"3.0.6\"}, {\"status\": \"affected\", \"version\": \"3.0.7\"}, {\"status\": \"affected\", \"version\": \"3.0.3\"}, {\"status\": \"affected\", \"version\": \"3.0.0\"}, {\"status\": \"affected\", \"version\": \"9.5.0\"}, {\"status\": \"affected\", \"version\": \"9.5.3\"}, {\"status\": \"affected\", \"version\": \"9.5.1\"}, {\"status\": \"affected\", \"version\": \"9.5.2\"}, {\"status\": \"affected\", \"version\": \"9.7.0\"}, {\"status\": \"affected\", \"version\": \"9.521\"}, {\"status\": \"affected\", \"version\": \"4.5.0\"}, {\"status\": \"affected\", \"version\": \"4.7.0\"}, {\"status\": \"affected\", \"version\": \"3.2.0\"}, {\"status\": \"affected\", \"version\": \"3.2.1\"}, {\"status\": \"affected\", \"version\": \"3.1.0\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB\", \"name\": \"cisco-sa-cli-cmdinj-4MttWZPB\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh\", \"name\": \"cisco-sa-confdcli-cmdinj-wybQDSSh\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\\r\\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-78\", \"description\": \"Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-11-15T15:56:42.927Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-20655\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-15T21:00:58.460Z\", \"dateReserved\": \"2021-11-02T13:28:29.037Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-11-15T15:56:42.927Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…