A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Adaptive Security Device Manager
Subscribe
Asa 5512-x
Subscribe
Asa 5512-x Firmware
Subscribe
Asa 5515-x
Subscribe
Asa 5515-x Firmware
Subscribe
Asa 5585-x
Subscribe
Asa 5585-x Firmware
Subscribe
Firepower 1010
Subscribe
Firepower 1120
Subscribe
Firepower 1140
Subscribe
Firepower 1150
Subscribe
Firepower 2110
Subscribe
Firepower 2120
Subscribe
Firepower 2130
Subscribe
Firepower 2140
Subscribe
Firepower 4110
Subscribe
Firepower 4112
Subscribe
Firepower 4115
Subscribe
Firepower 4120
Subscribe
Firepower 4125
Subscribe
Firepower 4140
Subscribe
Firepower 4145
Subscribe
Firepower 9300
Subscribe
Isa 3000
Subscribe
Isa 3000 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-26079 | A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 01 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-01T19:01:05.229Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20829
Updated: 2024-08-03T02:24:49.930Z
Status : Modified
Published: 2022-06-24T16:15:08.580
Modified: 2024-11-21T06:43:38.500
Link: CVE-2022-20829
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD