Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
|
Configuration 2 [-]
AND |
|
No data.
References
History
Wed, 06 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2022-09-30T18:45:26.687373Z
Updated: 2024-11-06T16:04:36.905Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20775
Vulnrichment
Updated: 2024-08-03T02:24:49.634Z
NVD
Status : Modified
Published: 2022-09-30T19:15:11.467
Modified: 2023-11-07T03:42:54.843
Link: CVE-2022-20775
Redhat
No data.