CVE-2022-20775

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/09/2022
Last modified:
26/02/2026

Description

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.<br /> <br /> This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.<br /> Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.<br /> https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.6.3 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* 20.6.3 (excluding)
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:* 20.6.3 (excluding)
cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:sd-wan_vedge_cloud:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* 20.6.3 (excluding)
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* 20.6.3 (excluding)
cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools