Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
|
Configuration 2 [-]
AND |
|
No data.
References
History
Fri, 01 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2022-09-30T18:45:36.170921Z
Updated: 2024-11-01T18:51:20.116Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20818
Vulnrichment
Updated: 2024-08-03T02:24:49.956Z
NVD
Status : Modified
Published: 2022-09-30T19:15:11.867
Modified: 2024-11-21T06:43:36.913
Link: CVE-2022-20818
Redhat
No data.