A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst 9105
Subscribe
Catalyst 9105axi
Subscribe
Catalyst 9105axw
Subscribe
Catalyst 9115
Subscribe
Catalyst 9115 Ap
Subscribe
Catalyst 9115axe
Subscribe
Catalyst 9115axi
Subscribe
Catalyst 9117
Subscribe
Catalyst 9117 Ap
Subscribe
Catalyst 9117axi
Subscribe
Catalyst 9120
Subscribe
Catalyst 9120 Ap
Subscribe
Catalyst 9120axe
Subscribe
Catalyst 9120axi
Subscribe
Catalyst 9120axp
Subscribe
Catalyst 9124
Subscribe
Catalyst 9124axd
Subscribe
Catalyst 9124axi
Subscribe
Catalyst 9130
Subscribe
Catalyst 9130 Ap
Subscribe
Catalyst 9130axe
Subscribe
Catalyst 9130axi
Subscribe
Catalyst 9800
Subscribe
Catalyst 9800-40
Subscribe
Catalyst 9800-80
Subscribe
Catalyst 9800-cl
Subscribe
Catalyst 9800-l
Subscribe
Catalyst 9800-l-c
Subscribe
Catalyst 9800-l-f
Subscribe
Ios Xe
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-26105 | A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 01 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-01T18:50:27.164Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20855
Updated: 2024-08-03T02:24:50.248Z
Status : Modified
Published: 2022-09-30T19:15:12.963
Modified: 2024-11-21T06:43:41.627
Link: CVE-2022-20855
No data.
OpenCVE Enrichment
No data.
EUVD