CVE-2022-20775

Severity CVSS v4.0:
Pending analysis
Type:
CWE-22 Path Traversal
Publication date:
30/09/2022
Last modified:
07/11/2023

Description

Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.6 (including) 20.6.3 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* 20.6 (including) 20.6.3 (excluding)
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* 20.6 (including) 20.6.3 (excluding)
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* 20.6 (including) 20.6.3 (excluding)
cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* 20.7 (including) 20.7.2 (excluding)
cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:*