CVE-2022-20716

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/04/2022
Last modified:
07/11/2023

Description

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cisco:catalyst_sd-wan_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_solution:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vedge_cloud:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vedge_router:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vsmart_controller_software:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* 18.4 (including) 20.6.1 (excluding)
cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* 20.7 (including) 20.7.1 (excluding)