Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2022-20655

Disclosure Date: November 15, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.
The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • Cisco

Products

  • Cisco IOS XR Software,
  • Cisco Virtual Topology System (VTS),
  • Cisco Network Services Orchestrator,
  • Cisco Enterprise NFV Infrastructure Software,
  • Cisco Catalyst SD-WAN,
  • Cisco Catalyst SD-WAN Manager,
  • Cisco IOS XE Catalyst SD-WAN,
  • Cisco SD-WAN vEdge Router,
  • Cisco Ultra Gateway Platform,
  • Cisco Carrier Packet Transport

Additional Info

Technical Analysis