QID 317255

Date Published: 2022-11-10

QID 317255: Cisco ESA and Cisco Secure Email and Web Manager Next Generation Management SQL Injection Vulnerability (cisco-sa-esasmawsa-vulns-YRuSW5mD)

A vulnerability in the next-generation UI management interface of Cisco ESA and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. To exploit this vulnerability, an attacker would need to have the credentials of a high-privileged user account.

Affected Products
CVE-2022-20868 affects Cisco ESA and Cisco Secure Email and Web Manager. CVE-2022-20867 affects Cisco ESA, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance.

QID Detection Logic (Authenticated):
The check matches Cisco ESA OS version and Cisco SMA OS version and WSA version retrieved via Unix Auth using "version" command.

A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution

    Customers are advised to refer to cisco-sa-esasmawsa-vulns-YRuSW5mD for more information.

    CVEs related to QID 317255

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-esasmawsa-vulns-YRuSW5mD URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD