A vulnerability in the web-based management interface and in the API subsystem of Cisco Tetration could allow an authenticated, remote attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted HTTP message to the affected system. A successful exploit could allow the attacker to execute commands with root-level privileges. To exploit this vulnerability, an attacker would need valid administrator-level credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
History

Tue, 19 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco secure Workload
CPEs cpe:2.3:a:cisco:secure_workload:*:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco secure Workload
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface and in the API subsystem of Cisco Tetration could allow an authenticated, remote attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted HTTP message to the affected system. A successful exploit could allow the attacker to execute commands with root-level privileges. To exploit this vulnerability, an attacker would need valid administrator-level credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Title Cisco Tetration Command Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-11-15T15:58:58.429Z

Updated: 2024-11-19T16:08:33.640Z

Reserved: 2021-11-02T13:28:29.036Z

Link: CVE-2022-20652

cve-icon Vulnrichment

Updated: 2024-11-15T19:43:00.879Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-15T16:15:20.520

Modified: 2024-11-18T17:11:56.587

Link: CVE-2022-20652

cve-icon Redhat

No data.