CVE-2022-20739
Published on: Not Yet Published
Last Modified on: 05/13/2022 06:56:00 PM UTC
CVE-2022-20739 - advisory for cisco-sa-sdwan-privesc-vman-tEJFpBSL
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Sd-wan Vmanage from Cisco contain the following vulnerability:
A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected system as a low-privileged user to exploit this vulnerability. This vulnerability exists because a file leveraged by a root user is executed when a low-privileged user runs specific commands on an affected system. An attacker could exploit this vulnerability by injecting arbitrary commands to a specific file as a lower-privileged user and then waiting until an admin user executes specific commands. The commands would then be executed on the device by the root user. A successful exploit could allow the attacker to escalate their privileges on the affected system from a low-privileged user to the root user.
- CVE-2022-20739 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
- Affected Vendor/Software:
Cisco - Cisco SD-WAN vManage version n/a
CVSS3 Score: 7.3 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 8.5 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | tools.cisco.com text/html |
![]() |
Related QID Numbers
- 317146 Cisco SD-WAN vManage Software Privilege Escalation Vulnerability (cisco-sa-sdwan-privesc-vman-tEJFpBSL)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Sd-wan Vmanage | All | All | All | All |
Application | Cisco | Sd-wan Vmanage | 20.7 | All | All | All |
- cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-20739 : A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local a… twitter.com/i/web/status/1… | 2022-04-15 14:36:53 |
![]() |
CVE-2022-20739 | 2022-04-15 15:38:32 |