Description
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful exploit could allow the attacker to overwrite arbitrary system files, which could result in a denial of service (DoS) condition.
Published: 2022-09-30
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-26180 A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful exploit could allow the attacker to overwrite arbitrary system files, which could result in a denial of service (DoS) condition.
History

Fri, 01 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Catalyst Sd-wan Manager Sd-wan Sd-wan Vbond Orchestrator Sd-wan Vmanage Sd-wan Vsmart Controller Vedge 100 Vedge 1000 Vedge 100b Vedge 100m Vedge 100wm Vedge 2000 Vedge 5000
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-01T18:50:04.587Z

Reserved: 2021-11-02T00:00:00.000Z

Link: CVE-2022-20930

cve-icon Vulnrichment

Updated: 2024-08-03T02:31:57.960Z

cve-icon NVD

Status : Modified

Published: 2022-09-30T19:15:13.557

Modified: 2024-11-21T06:43:50.820

Link: CVE-2022-20930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses