CVE-2022-20775
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/09/2022
Last modified:
26/02/2026
Description
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.<br />
<br />
This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.<br />
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.<br />
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.6.3 (excluding) | |
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* | 20.6.3 (excluding) | |
| cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:* | 20.6.3 (excluding) | |
| cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vedge_cloud:20.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* | 20.6.3 (excluding) | |
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* | 20.6.3 (excluding) | |
| cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775



