CVE-2022-20775
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
30/09/2022
Last modified:
07/11/2023
Description
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.6 (including) | 20.6.3 (excluding) |
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* | 20.6 (including) | 20.6.3 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* | 20.6 (including) | 20.6.3 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* | 20.6 (including) | 20.6.3 (excluding) |
| cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* | 20.7 (including) | 20.7.2 (excluding) |
| cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



