Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2022-AVI-060
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Cisco | ConfD | ConfD versions 6.4.x antérieures à 6.4.7.2 et 6.4.8 | ||
Cisco | Firepower Threat Defense | Cisco Firepower Threat Defense (FTD) Software versions antérieures à 6.4.13 | ||
Cisco | N/A | Cybervision Software versions antérieures à 4.0.2 | ||
Cisco | IOS XR | Cisco IOS XR (64-bit) Software versions antérieures à 7.0.2, 7.1.1 | ||
Cisco | N/A | Cisco Virtual Topology System (VTS) versions antérieures à 2.6.5 | ||
Cisco | N/A | Cisco SD-WAN vEdge Routers versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1 | ||
Cisco | N/A | Cisco Carrier Packet Transport toutes versions (aucun correctif ne sera publié car le produit est en fin de vie) | ||
Cisco | N/A | Cisco Enterprise NFV Infrastructure Software (NFVIS) versions antérieures à 3.12.1 | ||
Cisco | ConfD | ConfD versions 6.7.x antérieures à 6.7.1 | ||
Cisco | N/A | Cisco SD-WAN vSmart Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1 | ||
Cisco | ConfD | ConfD versions antérieures à 6.3.9.1 | ||
Cisco | Firepower Threat Defense | Cisco Firepower Threat Defense (FTD) Software versions 6.7.x et 7.0.x antérieures à 7.0.1 | ||
Cisco | N/A | Cisco Network Services Orchestrator (NSO) versions antérieures à 4.3.9.1, 4.4.5.6, 4.4.8, 4.5.7, 4.6.1.7, 4.6.2, 4.7.1, 5.1.0.1, 5.2 | ||
Cisco | ConfD | ConfD versions 6.6.x antérieures à 6.6.2 | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1 | ||
Cisco | N/A | Cisco Ultra Gateway Platform versions antérieures à 6.15.0 | ||
Cisco | IOS XE | Cisco IOS XE SD-WAN versions antérieures à 16.10.2, 16.12.1b, 17.2.1r | ||
Cisco | Meraki MX | Meraki MX Series Software toutes versions | ||
Cisco | N/A | Cisco SD-WAN vBond Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1 | ||
Cisco | Firepower Threat Defense | Cisco Firepower Threat Defense (FTD) Software versions 6.5.x et 6.6.x antérieures à 6.6.5.1 | ||
Cisco | N/A | Cisco RCM pour StarOS versions antérieures à 21.25.4 | ||
Cisco | N/A | Cisco Network Convergence System (NCS) 4009, 4016 versions antérieures à 6.5.32 | ||
Cisco | ConfD | ConfD versions 6.5.x antérieures à 6.5.7 |
References
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ConfD versions 6.4.x ant\u00e9rieures \u00e0 6.4.7.2 et 6.4.8", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Firepower Threat Defense (FTD) Software versions ant\u00e9rieures \u00e0 6.4.13", "product": { "name": "Firepower Threat Defense", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cybervision Software versions ant\u00e9rieures \u00e0 4.0.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS XR (64-bit) Software versions ant\u00e9rieures \u00e0 7.0.2, 7.1.1", "product": { "name": "IOS XR", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Virtual Topology System (VTS) versions ant\u00e9rieures \u00e0 2.6.5", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vEdge Routers versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Carrier Packet Transport toutes versions (aucun correctif ne sera publi\u00e9 car le produit est en fin de vie)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Enterprise NFV Infrastructure Software (NFVIS) versions ant\u00e9rieures \u00e0 3.12.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "ConfD versions 6.7.x ant\u00e9rieures \u00e0 6.7.1", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vSmart Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "ConfD versions ant\u00e9rieures \u00e0 6.3.9.1", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Firepower Threat Defense (FTD) Software versions 6.7.x et 7.0.x ant\u00e9rieures \u00e0 7.0.1", "product": { "name": "Firepower Threat Defense", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Network Services Orchestrator (NSO) versions ant\u00e9rieures \u00e0 4.3.9.1, 4.4.5.6, 4.4.8, 4.5.7, 4.6.1.7, 4.6.2, 4.7.1, 5.1.0.1, 5.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "ConfD versions 6.6.x ant\u00e9rieures \u00e0 6.6.2", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Ultra Gateway Platform versions ant\u00e9rieures \u00e0 6.15.0", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS XE SD-WAN versions ant\u00e9rieures \u00e0 16.10.2, 16.12.1b, 17.2.1r", "product": { "name": "IOS XE", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Meraki MX Series Software toutes versions", "product": { "name": "Meraki MX", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vBond Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Firepower Threat Defense (FTD) Software versions 6.5.x et 6.6.x ant\u00e9rieures \u00e0 6.6.5.1", "product": { "name": "Firepower Threat Defense", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco RCM pour StarOS versions ant\u00e9rieures \u00e0 21.25.4", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Network Convergence System (NCS) 4009, 4016 versions ant\u00e9rieures \u00e0 6.5.32", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "ConfD versions 6.5.x ant\u00e9rieures \u00e0 6.5.7", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-20649", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20649" }, { "name": "CVE-2022-20655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20655" }, { "name": "CVE-2022-20648", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20648" }, { "name": "CVE-2022-20685", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20685" } ], "initial_release_date": "2022-01-20T00:00:00", "last_revision_date": "2022-01-21T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-060", "revisions": [ { "description": "Version initiale", "revision_date": "2022-01-20T00:00:00.000000" }, { "description": "Ajout de la CVE-2022-20648", "revision_date": "2022-01-21T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cli-cmdinj-4MttWZPB du 19 janvier 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-snort-dos-9D3hJLuj du 19 janvier 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-confdcli-cmdinj-wybQDSSh du 19 janvier 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-rcm-vuls-7cS3Nuq du 19 janvier 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq" } ] }
CVE-2022-20655 (GCVE-0-2022-20655)
Vulnerability from cvelistv5
Published
2024-11-15 15:56
Modified
2024-11-15 21:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.
The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cisco | Cisco IOS XR Software |
Version: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:ios_xr_software:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xr_software", "vendor": "cisco", "versions": [ { "lessThan": "7.0.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.1.1", "status": "affected", "version": "7.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "virtual_topology_system", "vendor": "cisco", "versions": [ { "lessThan": "2.6.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "network_services_orchestrator", "vendor": "cisco", "versions": [ { "lessThan": "4.3.9.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.5.6", "status": "affected", "version": "4.4.0.0", "versionType": "custom" }, { "lessThan": "4.5.7", "status": "affected", "version": "4.5.0", "versionType": "custom" }, { "lessThan": "4.6.1.7", "status": "affected", "version": "4.6.0", "versionType": "custom" }, { "lessThan": "4.7.1", "status": "affected", "version": "4.7.0", "versionType": "custom" }, { "lessThan": "5.1.0.1", "status": "affected", "version": "5.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "enterprise_nfv_infrastructure_software", "vendor": "cisco", "versions": [ { "lessThan": "3.12.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "catalyst_sd-wan_manager", "vendor": "cisco", "versions": [ { "lessThan": "18.4.4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "19.2.1", "status": "affected", "version": "19.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xe_catalyst_sd-wan", "vendor": "cisco", "versions": [ { "lessThan": "16.10.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "16.12.1b", "status": "affected", "version": "16.12.0", "versionType": "custom" }, { "lessThan": "17.2.1r", "status": "affected", "version": "17.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sd-wan_vedge_router", "vendor": "cisco", "versions": [ { "lessThan": "18.4.4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "19.2.1", "status": "affected", "version": "19.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:carrier_packet_transport:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "carrier_packet_transport", "vendor": "cisco", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-20655", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T19:43:18.170598Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T21:00:58.460Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XR Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Virtual Topology System (VTS)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Network Services Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Enterprise NFV Infrastructure Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Catalyst SD-WAN", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco IOS XE Catalyst SD-WAN", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco SD-WAN vEdge Router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Ultra Gateway Platform", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Carrier Packet Transport", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.5" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "2.5" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "9.2.2" }, { "status": "affected", "version": "1.4.0" }, { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.3.0" }, { "status": "affected", "version": "2.3.3" }, { "status": "affected", "version": "2.3.5" }, { "status": "affected", "version": "2.3.4" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.5" }, { "status": "affected", "version": "2.4.0" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "10.8.0" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "1.0.2" }, { "status": "affected", "version": "1.1.1" }, { "status": "affected", "version": "1.1.2" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "12.1.0" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.8.0" }, { "status": "affected", "version": "4.1.82" }, { "status": "affected", "version": "4.1.4" }, { "status": "affected", "version": "4.6.1" }, { "status": "affected", "version": "4.0.4" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "6.2.4" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "9.5.0" }, { "status": "affected", "version": "9.5.3" }, { "status": "affected", "version": "9.5.1" }, { "status": "affected", "version": "9.5.2" }, { "status": "affected", "version": "9.7.0" }, { "status": "affected", "version": "9.521" }, { "status": "affected", "version": "4.5.0" }, { "status": "affected", "version": "4.7.0" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\r\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:56:42.927Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cli-cmdinj-4MttWZPB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB" }, { "name": "cisco-sa-confdcli-cmdinj-wybQDSSh", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh" } ], "source": { "advisory": "cisco-sa-cli-cmdinj-4MttWZPB", "defects": [ "CSCvq22323", "CSCvq58164", "CSCvq58224", "CSCvq58168", "CSCvq58183", "CSCvq58226", "CSCvz49669", "CSCvq58204", "CSCvm76596" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20655", "datePublished": "2024-11-15T15:56:42.927Z", "dateReserved": "2021-11-02T13:28:29.037Z", "dateUpdated": "2024-11-15T21:00:58.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20648 (GCVE-0-2022-20648)
Vulnerability from cvelistv5
Published
2024-11-15 15:59
Modified
2024-11-15 18:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
A vulnerability in a debug function for Cisco RCM for Cisco StarOS Software could allow an unauthenticated, remote attacker to perform debug actions that could result in the disclosure of confidential information that should be restricted.
This vulnerability exists because of a debug service that incorrectly listens to and accepts incoming connections. An attacker could exploit this vulnerability by connecting to the debug port and executing debug commands. A successful exploit could allow the attacker to view sensitive debugging information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Redundancy Configuration Manager |
Version: 2021.02.0 Version: 2021.01.0 Version: 21.19.n13 Version: 21.17.19 Version: 21.18.24 Version: 21.25.0 Version: 21.15.60 Version: 21.22.11 Version: 21.20.25 Version: 21.20.21 Version: 21.24.2 Version: 21.23.10 Version: 21.22.n5 Version: 21.15.57 Version: 21.25.1 Version: 21.18.21 Version: 21.23.1 Version: 21.19.11 Version: 21.16.c16 Version: 21.23.5 Version: 21.22.4 Version: 21.22.ua2 Version: 21.23.n6 Version: 21.17.18 Version: 21.17.17 Version: 21.21.KS2 Version: 21.20.23 Version: 21.20.15 Version: 21.20.p9 Version: 21.20.17 Version: 21.20.14 Version: 21.21.3 Version: 21.19.n9 Version: 21.23.0 Version: 21.5.30 Version: 21.22.n4 Version: 21.20.12 Version: 21.23.b2 Version: 21.20.13 Version: 21.18.22 Version: 21.18.23 Version: 21.20.24 Version: 21.23.6 Version: 21.21.1 Version: 21.23.8 Version: 21.11.20 Version: 21.15.58 Version: 21.24.0 Version: 21.18.18 Version: 21.20.u8 Version: 21.18.19 Version: 21.21.2 Version: 21.22.2 Version: 21.22.8 Version: 21.22.uj3 Version: 21.22.5 Version: 21.22.3 Version: 21.22.10 Version: 21.18.20 Version: 21.15.55 Version: 21.12.22 Version: 21.23.4 Version: 21.15.59 Version: 21.22.ua0 Version: 21.20.16 Version: 21.20.18 Version: 21.20.19 Version: 21.19.n7 Version: 21.20.20 Version: 21.19.n10 Version: 21.19.n11 Version: 21.22.7 Version: 21.22.ua3 Version: 21.19.n12 Version: 21.23.9 Version: 21.18.16 Version: 21.16.10 Version: 21.22.6 Version: 21.18.17 Version: 21.24.1 Version: 21.11.21 Version: 21.23.3 Version: 21.9.13 Version: 21.20.k8 Version: 21.19.n8 Version: 21.22.9 Version: 21.16.c17 Version: 21.16.9 Version: 21.23.2 Version: 21.20.22 Version: 21.18.7 Version: 21.19.6 Version: 21.23.7 Version: 21.11.16 Version: 21.18.13 Version: 21.15.47 Version: 21.19.n6 Version: 6.9.8 Version: 21.20.k6 Version: 21.20.6 Version: 21.19.10 Version: 21.19.n4 Version: 21.15.46 Version: 21.17.14 Version: 21.15.52 Version: 21.16.6 Version: 21.22.n3 Version: 21.15.54 Version: 21.18.15 Version: 21.18.11 Version: 21.18.8 Version: 21.12.20 Version: 21.5.28 Version: 21.20.11 Version: 21.8.12 Version: 21.19.7 Version: 21.19.5 Version: 21.11.19 Version: 21.16.c15 Version: 21.18.12 Version: 21.15.51 Version: 21.18.14 Version: 21.11.15 Version: 21.16.c14 Version: 21.20.4 Version: 21.20.7 Version: 21.14.b22 Version: 21.17.10 Version: 21.12.21 Version: 21.19.9 Version: 21.13.21 Version: 21.14.23 Version: 21.20.UV0 Version: 21.10.6 Version: 21.15.45 Version: 21.15.53 Version: 21.17.15 Version: 21.17.16 Version: 6.14.2 Version: 21.19.n3 Version: 21.17.11 Version: 21.21.0 Version: 21.20.10 Version: 21.20.3 Version: 21.20.5 Version: 21.16.7 Version: 21.22.1 Version: 21.17.9 Version: 21.17.13 Version: 21.20.2 Version: 21.20.9 Version: 21.5.27 Version: 21.14.22 Version: 21.19.8 Version: 21.22.n2 Version: 21.16.8 Version: 21.11.17 Version: 21.20.8 Version: 21.20.k7 Version: 21.18.9 Version: 21.19.n5 Version: 21.11.18 Version: 21.5.29 Version: 21.15.48 Version: 21.22.0 Version: 21.14.b19 Version: 21.15.17 Version: 21.16.c4 Version: 21.19.2 Version: 6.2.b17 Version: 6.9.7 Version: 21.16.c6 Version: 21.17.8 Version: 21.11.13 Version: 21.12.19 Version: 21.12.18 Version: 21.6.15 Version: 21.20.0 Version: 6.13.EY2 Version: 21.15.36 Version: 21.15.21 Version: 21.15.43 Version: 6.14.0 Version: 21.14.b15 Version: 21.15.14 Version: 21.15.15 Version: 21.16.c7 Version: 21.16.c3 Version: 6.13.EY1 Version: 21.15.13 Version: 21.12.15 Version: 21.5.25 Version: 21.14.b12 Version: 21.18.6 Version: 21.19.4 Version: 21.17.3 Version: 21.16.c5 Version: 21.14.b21 Version: 21.18.1 Version: 6.11.0 Version: 21.14.17 Version: 21.5.26 Version: 21.14.b13 Version: 21.14.b16 Version: 21.15.22 Version: 21.15.23 Version: 21.16.3 Version: 21.16.c10 Version: 21.16.d1 Version: 21.15.28 Version: 21.11.11 Version: 21.15.30 Version: 21.15.29 Version: 21.13.18 Version: 21.12.16 Version: 21.17.5 Version: 21.14.b18 Version: 21.14.RH0 Version: 21.14.b14 Version: 6.6.7 Version: 21.15.20 Version: 21.15.32 Version: 21.14.18 Version: 21.6.b25 Version: 21.17.2 Version: 6.2.b15 Version: 21.15.33 Version: 21.13.19 Version: 6.2.b14 Version: 21.19.n1 Version: 21.19.1 Version: 21.19.0 Version: 21.6.b26 Version: 6.2.b16 Version: 21.11.12 Version: 21.18.3 Version: 21.17.7 Version: 21.14.12 Version: 21.19.n2 Version: 21.16.c11 Version: 21.16.c12 Version: 6.10.0 Version: 21.16.4 Version: 6.13.0 Version: 21.13.16 Version: 21.16.c13 Version: 21.17.1 Version: 21.17.6 Version: 21.12.17 Version: 21.11.10 Version: 21.20.SV1 Version: 21.11.14 Version: 6.11.1 Version: 21.17.0 Version: 21.9.12 Version: 21.20.1 Version: 21.14.19 Version: 21.14.c3 Version: 21.15.18 Version: 21.15.19 Version: 21.15.16 Version: 21.15.39 Version: 6.6.6 Version: 21.14.11 Version: 21.14.b17 Version: 21.14.16 Version: 21.15.24 Version: 21.6.b24 Version: 21.16.c9 Version: 21.16.c8 Version: 6.8.1 Version: 21.15.27 Version: 21.15.26 Version: 21.15.25 Version: 21.17.4 Version: 21.13.17 Version: 6.9.5 Version: 21.18.5 Version: 21.15.40 Version: 6.12.0 Version: 21.18.2 Version: 21.12.14 Version: 21.16.d0 Version: 21.14.20 Version: 21.18.0 Version: 21.15.37 Version: 21.15.41 Version: 21.18.4 Version: 21.20.SV2 Version: 21.20.SV3 Version: 21.16.5 Version: 21.20.SV5 Version: 5.1.15 Version: 21.19.3 Version: 21.13.20 Version: 21.14.b20 Version: 21.15.7 Version: 21.13.15 Version: 21.15.11 Version: 21.15.9 Version: 21.15.0 Version: 21.10.4 Version: 21.12.12 Version: 21.12.4 Version: 21.12.8 Version: 21.15.5 Version: 21.13.8 Version: 21.8.10 Version: 21.14.6 Version: 21.15.1 Version: 21.8.11 Version: 21.4.16 Version: 21.9.11 Version: 21.16.c0 Version: 21.13.14 Version: 21.13.4 Version: 21.14.7 Version: 21.14.8 Version: 21.9.8 Version: 21.16.c2 Version: 21.15.10 Version: 21.15.2 Version: 21.15.6 Version: 6.7.0 Version: 21.13.6 Version: 21.9.10 Version: 21.14.1 Version: 21.7.13 Version: 21.11.8 Version: 21.14.2 Version: 21.14.0 Version: 21.12.10 Version: 21.9.9 Version: 21.13.5 Version: 21.13.2 Version: 21.13.9 Version: 21.13.10 Version: 21.12.5 Version: 21.12.9 Version: 21.5.23 Version: 21.14.10 Version: 21.14.c2 Version: 21.14.9 Version: 21.11.6 Version: 21.5.20 Version: 21.13.12 Version: 21.15.12 Version: 6.9.2 Version: 21.15.4 Version: 21.13.11 Version: 21.13.7 Version: 21.10.5 Version: 21.6.b19 Version: 21.6.b23 Version: 21.13.0 Version: 21.6.14 Version: 21.13.13 Version: 21.4.17 Version: 21.11.9 Version: 21.11.2 Version: 21.15.8 Version: 21.16.2 Version: 21.16.1 Version: 21.16.c1 Version: 21.5.21 Version: 21.11.4 Version: 21.6.b21 Version: 21.14.a5 Version: 21.10.3 Version: 21.11.5 Version: 21.13.3 Version: 21.5.22 Version: 21.12.7 Version: 21.12.13 Version: 21.12.6 Version: 21.5.19 Version: 21.6.b22 Version: 21.11.7 Version: 21.13.1 Version: 21.14.a0 Version: 21.14.4 Version: 21.14.5 Version: 21.5.24 Version: 21.14.3 Version: 21.16.0 Version: 21.6.b20 Version: 21.7.5 Version: 21.15.3 Version: 21.6.12 Version: 21.8.5 Version: 21.9.7 Version: 21.12.11 Version: 21.12.2 Version: 6.2.b6 Version: 21.8.4 Version: 6.2.b5 Version: 21.5.15 Version: 21.8.1 Version: 21.4.13 Version: 21.10.0 Version: 21.5.13 Version: 21.9.0 Version: 21.9.4 Version: 21.4.9 Version: 21.4.12 Version: 21.11.3 Version: 21.5.16 Version: 21.7.9 Version: 6.5.0 Version: 21.4.8 Version: 21.6.8 Version: 21.6.5 Version: 21.8.3 Version: 21.6.10 Version: 21.6.4 Version: 21.7.8 Version: 21.4.15 Version: 21.4.11 Version: 21.8.6 Version: 21.8.ca1 Version: 21.9.6 Version: 21.4.7 Version: 21.11.0 Version: 21.11.1 Version: 21.5.7 Version: 6.2.b4 Version: 21.7.7 Version: 21.6.b14 Version: 21.6.b13 Version: 21.6.b15 Version: 21.7.6 Version: 21.6.6 Version: 21.9.5 Version: 21.5.9 Version: 21.5.14 Version: 21.8.8 Version: 21.5.12 Version: 21.8.0 Version: 21.5.8 Version: 21.7.10 Version: 6.2.5 Version: 21.8.9 Version: 6.4.0 Version: 21.6.b17 Version: 21.6.b16 Version: 21.6.11 Version: 21.10.1 Version: 21.4.10 Version: 21.4.14 Version: 21.6.9 Version: 21.6.7 Version: 21.12.3 Version: 21.9.1 Version: 21.9.2 Version: 21.12.0 Version: 21.7.12 Version: 21.10.2 Version: 21.8.7 Version: 21.8.2 Version: 21.5.6 Version: 21.5.10 Version: 21.6.13 Version: 21.6.b18 Version: 21.7.11 Version: 21.7.1 Version: 21.9.3 Version: 21.7.0 Version: 21.5.11 Version: 21.5.17 Version: 21.5.4 Version: 21.7.3 Version: 21.4.1 Version: 21.4.3 Version: 21.7.2 Version: 21.4.5 Version: 21.5.2 Version: 21.6.3 Version: 21.6.0 Version: 21.6.2 Version: 21.5.5 Version: 21.4.6 Version: 21.4.0 Version: 21.4.2 Version: 21.4.4 Version: 21.7.4 Version: 21.5.0 Version: 21.5.1 Version: 21.6.1 Version: 21.5.3 Version: 21.19.n14 Version: 21.25.3 Version: 21.23.11 Version: 21.23.b3 Version: 21.20.c22 Version: 21.20.27 Version: 21.23.n7 Version: 21.20.26 Version: 21.23.12 Version: 21.20.28 Version: 21.22.ua5 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:redundancy_configuration_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "redundancy_configuration_manager", "vendor": "cisco", "versions": [ { "lessThan": "21.25.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-20648", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:12:38.402406Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:14:54.282Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Redundancy Configuration Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2021.02.0" }, { "status": "affected", "version": "2021.01.0" }, { "status": "affected", "version": "21.19.n13" }, { "status": "affected", "version": "21.17.19" }, { "status": "affected", "version": "21.18.24" }, { "status": "affected", "version": "21.25.0" }, { "status": "affected", "version": "21.15.60" }, { "status": "affected", "version": "21.22.11" }, { "status": "affected", "version": "21.20.25" }, { "status": "affected", "version": "21.20.21" }, { "status": "affected", "version": "21.24.2" }, { "status": "affected", "version": "21.23.10" }, { "status": "affected", "version": "21.22.n5" }, { "status": "affected", "version": "21.15.57" }, { "status": "affected", "version": "21.25.1" }, { "status": "affected", "version": "21.18.21" }, { "status": "affected", "version": "21.23.1" }, { "status": "affected", "version": "21.19.11" }, { "status": "affected", "version": "21.16.c16" }, { "status": "affected", "version": "21.23.5" }, { "status": "affected", "version": "21.22.4" }, { "status": "affected", "version": "21.22.ua2" }, { "status": "affected", "version": "21.23.n6" }, { "status": "affected", "version": "21.17.18" }, { "status": "affected", "version": "21.17.17" }, { "status": "affected", "version": "21.21.KS2" }, { "status": "affected", "version": "21.20.23" }, { "status": "affected", "version": "21.20.15" }, { "status": "affected", "version": "21.20.p9" }, { "status": "affected", "version": "21.20.17" }, { "status": "affected", "version": "21.20.14" }, { "status": "affected", "version": "21.21.3" }, { "status": "affected", "version": "21.19.n9" }, { "status": "affected", "version": "21.23.0" }, { "status": "affected", "version": "21.5.30" }, { "status": "affected", "version": "21.22.n4" }, { "status": "affected", "version": "21.20.12" }, { "status": "affected", "version": "21.23.b2" }, { "status": "affected", "version": "21.20.13" }, { "status": "affected", "version": "21.18.22" }, { "status": "affected", "version": "21.18.23" }, { "status": "affected", "version": "21.20.24" }, { "status": "affected", "version": "21.23.6" }, { "status": "affected", "version": "21.21.1" }, { "status": "affected", "version": "21.23.8" }, { "status": "affected", "version": "21.11.20" }, { "status": "affected", "version": "21.15.58" }, { "status": "affected", "version": "21.24.0" }, { "status": "affected", "version": "21.18.18" }, { "status": "affected", "version": "21.20.u8" }, { "status": "affected", "version": "21.18.19" }, { "status": "affected", "version": "21.21.2" }, { "status": "affected", "version": "21.22.2" }, { "status": "affected", "version": "21.22.8" }, { "status": "affected", "version": "21.22.uj3" }, { "status": "affected", "version": "21.22.5" }, { "status": "affected", "version": "21.22.3" }, { "status": "affected", "version": "21.22.10" }, { "status": "affected", "version": "21.18.20" }, { "status": "affected", "version": "21.15.55" }, { "status": "affected", "version": "21.12.22" }, { "status": "affected", "version": "21.23.4" }, { "status": "affected", "version": "21.15.59" }, { "status": "affected", "version": "21.22.ua0" }, { "status": "affected", "version": "21.20.16" }, { "status": "affected", "version": "21.20.18" }, { "status": "affected", "version": "21.20.19" }, { "status": "affected", "version": "21.19.n7" }, { "status": "affected", "version": "21.20.20" }, { "status": "affected", "version": "21.19.n10" }, { "status": "affected", "version": "21.19.n11" }, { "status": "affected", "version": "21.22.7" }, { "status": "affected", "version": "21.22.ua3" }, { "status": "affected", "version": "21.19.n12" }, { "status": "affected", "version": "21.23.9" }, { "status": "affected", "version": "21.18.16" }, { "status": "affected", "version": "21.16.10" }, { "status": "affected", "version": "21.22.6" }, { "status": "affected", "version": "21.18.17" }, { "status": "affected", "version": "21.24.1" }, { "status": "affected", "version": "21.11.21" }, { "status": "affected", "version": "21.23.3" }, { "status": "affected", "version": "21.9.13" }, { "status": "affected", "version": "21.20.k8" }, { "status": "affected", "version": "21.19.n8" }, { "status": "affected", "version": "21.22.9" }, { "status": "affected", "version": "21.16.c17" }, { "status": "affected", "version": "21.16.9" }, { "status": "affected", "version": "21.23.2" }, { "status": "affected", "version": "21.20.22" }, { "status": "affected", "version": "21.18.7" }, { "status": "affected", "version": "21.19.6" }, { "status": "affected", "version": "21.23.7" }, { "status": "affected", "version": "21.11.16" }, { "status": "affected", "version": "21.18.13" }, { "status": "affected", "version": "21.15.47" }, { "status": "affected", "version": "21.19.n6" }, { "status": "affected", "version": "6.9.8" }, { "status": "affected", "version": "21.20.k6" }, { "status": "affected", "version": "21.20.6" }, { "status": "affected", "version": "21.19.10" }, { "status": "affected", "version": "21.19.n4" }, { "status": "affected", "version": "21.15.46" }, { "status": "affected", "version": "21.17.14" }, { "status": "affected", "version": "21.15.52" }, { "status": "affected", "version": "21.16.6" }, { "status": "affected", "version": "21.22.n3" }, { "status": "affected", "version": "21.15.54" }, { "status": "affected", "version": "21.18.15" }, { "status": "affected", "version": "21.18.11" }, { "status": "affected", "version": "21.18.8" }, { "status": "affected", "version": "21.12.20" }, { "status": "affected", "version": "21.5.28" }, { "status": "affected", "version": "21.20.11" }, { "status": "affected", "version": "21.8.12" }, { "status": "affected", "version": "21.19.7" }, { "status": "affected", "version": "21.19.5" }, { "status": "affected", "version": "21.11.19" }, { "status": "affected", "version": "21.16.c15" }, { "status": "affected", "version": "21.18.12" }, { "status": "affected", "version": "21.15.51" }, { "status": "affected", "version": "21.18.14" }, { "status": "affected", "version": "21.11.15" }, { "status": "affected", "version": "21.16.c14" }, { "status": "affected", "version": "21.20.4" }, { "status": "affected", "version": "21.20.7" }, { "status": "affected", "version": "21.14.b22" }, { "status": "affected", "version": "21.17.10" }, { "status": "affected", "version": "21.12.21" }, { "status": "affected", "version": "21.19.9" }, { "status": "affected", "version": "21.13.21" }, { "status": "affected", "version": "21.14.23" }, { "status": "affected", "version": "21.20.UV0" }, { "status": "affected", "version": "21.10.6" }, { "status": "affected", "version": "21.15.45" }, { "status": "affected", "version": "21.15.53" }, { "status": "affected", "version": "21.17.15" }, { "status": "affected", "version": "21.17.16" }, { "status": "affected", "version": "6.14.2" }, { "status": "affected", "version": "21.19.n3" }, { "status": "affected", "version": "21.17.11" }, { "status": "affected", "version": "21.21.0" }, { "status": "affected", "version": "21.20.10" }, { "status": "affected", "version": "21.20.3" }, { "status": "affected", "version": "21.20.5" }, { "status": "affected", "version": "21.16.7" }, { "status": "affected", "version": "21.22.1" }, { "status": "affected", "version": "21.17.9" }, { "status": "affected", "version": "21.17.13" }, { "status": "affected", "version": "21.20.2" }, { "status": "affected", "version": "21.20.9" }, { "status": "affected", "version": "21.5.27" }, { "status": "affected", "version": "21.14.22" }, { "status": "affected", "version": "21.19.8" }, { "status": "affected", "version": "21.22.n2" }, { "status": "affected", "version": "21.16.8" }, { "status": "affected", "version": "21.11.17" }, { "status": "affected", "version": "21.20.8" }, { "status": "affected", "version": "21.20.k7" }, { "status": "affected", "version": "21.18.9" }, { "status": "affected", "version": "21.19.n5" }, { "status": "affected", "version": "21.11.18" }, { "status": "affected", "version": "21.5.29" }, { "status": "affected", "version": "21.15.48" }, { "status": "affected", "version": "21.22.0" }, { "status": "affected", "version": "21.14.b19" }, { "status": "affected", "version": "21.15.17" }, { "status": "affected", "version": "21.16.c4" }, { "status": "affected", "version": "21.19.2" }, { "status": "affected", "version": "6.2.b17" }, { "status": "affected", "version": "6.9.7" }, { "status": "affected", "version": "21.16.c6" }, { "status": "affected", "version": "21.17.8" }, { "status": "affected", "version": "21.11.13" }, { "status": "affected", "version": "21.12.19" }, { "status": "affected", "version": "21.12.18" }, { "status": "affected", "version": "21.6.15" }, { "status": "affected", "version": "21.20.0" }, { "status": "affected", "version": "6.13.EY2" }, { "status": "affected", "version": "21.15.36" }, { "status": "affected", "version": "21.15.21" }, { "status": "affected", "version": "21.15.43" }, { "status": "affected", "version": "6.14.0" }, { "status": "affected", "version": "21.14.b15" }, { "status": "affected", "version": "21.15.14" }, { "status": "affected", "version": "21.15.15" }, { "status": "affected", "version": "21.16.c7" }, { "status": "affected", "version": "21.16.c3" }, { "status": "affected", "version": "6.13.EY1" }, { "status": "affected", "version": "21.15.13" }, { "status": "affected", "version": "21.12.15" }, { "status": "affected", "version": "21.5.25" }, { "status": "affected", "version": "21.14.b12" }, { "status": "affected", "version": "21.18.6" }, { "status": "affected", "version": "21.19.4" }, { "status": "affected", "version": "21.17.3" }, { "status": "affected", "version": "21.16.c5" }, { "status": "affected", "version": "21.14.b21" }, { "status": "affected", "version": "21.18.1" }, { "status": "affected", "version": "6.11.0" }, { "status": "affected", "version": "21.14.17" }, { "status": "affected", "version": "21.5.26" }, { "status": "affected", "version": "21.14.b13" }, { "status": "affected", "version": "21.14.b16" }, { "status": "affected", "version": "21.15.22" }, { "status": "affected", "version": "21.15.23" }, { "status": "affected", "version": "21.16.3" }, { "status": "affected", "version": "21.16.c10" }, { "status": "affected", "version": "21.16.d1" }, { "status": "affected", "version": "21.15.28" }, { "status": "affected", "version": "21.11.11" }, { "status": "affected", "version": "21.15.30" }, { "status": "affected", "version": "21.15.29" }, { "status": "affected", "version": "21.13.18" }, { "status": "affected", "version": "21.12.16" }, { "status": "affected", "version": "21.17.5" }, { "status": "affected", "version": "21.14.b18" }, { "status": "affected", "version": "21.14.RH0" }, { "status": "affected", "version": "21.14.b14" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "21.15.20" }, { "status": "affected", "version": "21.15.32" }, { "status": "affected", "version": "21.14.18" }, { "status": "affected", "version": "21.6.b25" }, { "status": "affected", "version": "21.17.2" }, { "status": "affected", "version": "6.2.b15" }, { "status": "affected", "version": "21.15.33" }, { "status": "affected", "version": "21.13.19" }, { "status": "affected", "version": "6.2.b14" }, { "status": "affected", "version": "21.19.n1" }, { "status": "affected", "version": "21.19.1" }, { "status": "affected", "version": "21.19.0" }, { "status": "affected", "version": "21.6.b26" }, { "status": "affected", "version": "6.2.b16" }, { "status": "affected", "version": "21.11.12" }, { "status": "affected", "version": "21.18.3" }, { "status": "affected", "version": "21.17.7" }, { "status": "affected", "version": "21.14.12" }, { "status": "affected", "version": "21.19.n2" }, { "status": "affected", "version": "21.16.c11" }, { "status": "affected", "version": "21.16.c12" }, { "status": "affected", "version": "6.10.0" }, { "status": "affected", "version": "21.16.4" }, { "status": "affected", "version": "6.13.0" }, { "status": "affected", "version": "21.13.16" }, { "status": "affected", "version": "21.16.c13" }, { "status": "affected", "version": "21.17.1" }, { "status": "affected", "version": "21.17.6" }, { "status": "affected", "version": "21.12.17" }, { "status": "affected", "version": "21.11.10" }, { "status": "affected", "version": "21.20.SV1" }, { "status": "affected", "version": "21.11.14" }, { "status": "affected", "version": "6.11.1" }, { "status": "affected", "version": "21.17.0" }, { "status": "affected", "version": "21.9.12" }, { "status": "affected", "version": "21.20.1" }, { "status": "affected", "version": "21.14.19" }, { "status": "affected", "version": "21.14.c3" }, { "status": "affected", "version": "21.15.18" }, { "status": "affected", "version": "21.15.19" }, { "status": "affected", "version": "21.15.16" }, { "status": "affected", "version": "21.15.39" }, { "status": "affected", "version": "6.6.6" }, { "status": "affected", "version": "21.14.11" }, { "status": "affected", "version": "21.14.b17" }, { "status": "affected", "version": "21.14.16" }, { "status": "affected", "version": "21.15.24" }, { "status": "affected", "version": "21.6.b24" }, { "status": "affected", "version": "21.16.c9" }, { "status": "affected", "version": "21.16.c8" }, { "status": "affected", "version": "6.8.1" }, { "status": "affected", "version": "21.15.27" }, { "status": "affected", "version": "21.15.26" }, { "status": "affected", "version": "21.15.25" }, { "status": "affected", "version": "21.17.4" }, { "status": "affected", "version": "21.13.17" }, { "status": "affected", "version": "6.9.5" }, { "status": "affected", "version": "21.18.5" }, { "status": "affected", "version": "21.15.40" }, { "status": "affected", "version": "6.12.0" }, { "status": "affected", "version": "21.18.2" }, { "status": "affected", "version": "21.12.14" }, { "status": "affected", "version": "21.16.d0" }, { "status": "affected", "version": "21.14.20" }, { "status": "affected", "version": "21.18.0" }, { "status": "affected", "version": "21.15.37" }, { "status": "affected", "version": "21.15.41" }, { "status": "affected", "version": "21.18.4" }, { "status": "affected", "version": "21.20.SV2" }, { "status": "affected", "version": "21.20.SV3" }, { "status": "affected", "version": "21.16.5" }, { "status": "affected", "version": "21.20.SV5" }, { "status": "affected", "version": "5.1.15" }, { "status": "affected", "version": "21.19.3" }, { "status": "affected", "version": "21.13.20" }, { "status": "affected", "version": "21.14.b20" }, { "status": "affected", "version": "21.15.7" }, { "status": "affected", "version": "21.13.15" }, { "status": "affected", "version": "21.15.11" }, { "status": "affected", "version": "21.15.9" }, { "status": "affected", "version": "21.15.0" }, { "status": "affected", "version": "21.10.4" }, { "status": "affected", "version": "21.12.12" }, { "status": "affected", "version": "21.12.4" }, { "status": "affected", "version": "21.12.8" }, { "status": "affected", "version": "21.15.5" }, { "status": "affected", "version": "21.13.8" }, { "status": "affected", "version": "21.8.10" }, { "status": "affected", "version": "21.14.6" }, { "status": "affected", "version": "21.15.1" }, { "status": "affected", "version": "21.8.11" }, { "status": "affected", "version": "21.4.16" }, { "status": "affected", "version": "21.9.11" }, { "status": "affected", "version": "21.16.c0" }, { "status": "affected", "version": "21.13.14" }, { "status": "affected", "version": "21.13.4" }, { "status": "affected", "version": "21.14.7" }, { "status": "affected", "version": "21.14.8" }, { "status": "affected", "version": "21.9.8" }, { "status": "affected", "version": "21.16.c2" }, { "status": "affected", "version": "21.15.10" }, { "status": "affected", "version": "21.15.2" }, { "status": "affected", "version": "21.15.6" }, { "status": "affected", "version": "6.7.0" }, { "status": "affected", "version": "21.13.6" }, { "status": "affected", "version": "21.9.10" }, { "status": "affected", "version": "21.14.1" }, { "status": "affected", "version": "21.7.13" }, { "status": "affected", "version": "21.11.8" }, { "status": "affected", "version": "21.14.2" }, { "status": "affected", "version": "21.14.0" }, { "status": "affected", "version": "21.12.10" }, { "status": "affected", "version": "21.9.9" }, { "status": "affected", "version": "21.13.5" }, { "status": "affected", "version": "21.13.2" }, { "status": "affected", "version": "21.13.9" }, { "status": "affected", "version": "21.13.10" }, { "status": "affected", "version": "21.12.5" }, { "status": "affected", "version": "21.12.9" }, { "status": "affected", "version": "21.5.23" }, { "status": "affected", "version": "21.14.10" }, { "status": "affected", "version": "21.14.c2" }, { "status": "affected", "version": "21.14.9" }, { "status": "affected", "version": "21.11.6" }, { "status": "affected", "version": "21.5.20" }, { "status": "affected", "version": "21.13.12" }, { "status": "affected", "version": "21.15.12" }, { "status": "affected", "version": "6.9.2" }, { "status": "affected", "version": "21.15.4" }, { "status": "affected", "version": "21.13.11" }, { "status": "affected", "version": "21.13.7" }, { "status": "affected", "version": "21.10.5" }, { "status": "affected", "version": "21.6.b19" }, { "status": "affected", "version": "21.6.b23" }, { "status": "affected", "version": "21.13.0" }, { "status": "affected", "version": "21.6.14" }, { "status": "affected", "version": "21.13.13" }, { "status": "affected", "version": "21.4.17" }, { "status": "affected", "version": "21.11.9" }, { "status": "affected", "version": "21.11.2" }, { "status": "affected", "version": "21.15.8" }, { "status": "affected", "version": "21.16.2" }, { "status": "affected", "version": "21.16.1" }, { "status": "affected", "version": "21.16.c1" }, { "status": "affected", "version": "21.5.21" }, { "status": "affected", "version": "21.11.4" }, { "status": "affected", "version": "21.6.b21" }, { "status": "affected", "version": "21.14.a5" }, { "status": "affected", "version": "21.10.3" }, { "status": "affected", "version": "21.11.5" }, { "status": "affected", "version": "21.13.3" }, { "status": "affected", "version": "21.5.22" }, { "status": "affected", "version": "21.12.7" }, { "status": "affected", "version": "21.12.13" }, { "status": "affected", "version": "21.12.6" }, { "status": "affected", "version": "21.5.19" }, { "status": "affected", "version": "21.6.b22" }, { "status": "affected", "version": "21.11.7" }, { "status": "affected", "version": "21.13.1" }, { "status": "affected", "version": "21.14.a0" }, { "status": "affected", "version": "21.14.4" }, { "status": "affected", "version": "21.14.5" }, { "status": "affected", "version": "21.5.24" }, { "status": "affected", "version": "21.14.3" }, { "status": "affected", "version": "21.16.0" }, { "status": "affected", "version": "21.6.b20" }, { "status": "affected", "version": "21.7.5" }, { "status": "affected", "version": "21.15.3" }, { "status": "affected", "version": "21.6.12" }, { "status": "affected", "version": "21.8.5" }, { "status": "affected", "version": "21.9.7" }, { "status": "affected", "version": "21.12.11" }, { "status": "affected", "version": "21.12.2" }, { "status": "affected", "version": "6.2.b6" }, { "status": "affected", "version": "21.8.4" }, { "status": "affected", "version": "6.2.b5" }, { "status": "affected", "version": "21.5.15" }, { "status": "affected", "version": "21.8.1" }, { "status": "affected", "version": "21.4.13" }, { "status": "affected", "version": "21.10.0" }, { "status": "affected", "version": "21.5.13" }, { "status": "affected", "version": "21.9.0" }, { "status": "affected", "version": "21.9.4" }, { "status": "affected", "version": "21.4.9" }, { "status": "affected", "version": "21.4.12" }, { "status": "affected", "version": "21.11.3" }, { "status": "affected", "version": "21.5.16" }, { "status": "affected", "version": "21.7.9" }, { "status": "affected", "version": "6.5.0" }, { "status": "affected", "version": "21.4.8" }, { "status": "affected", "version": "21.6.8" }, { "status": "affected", "version": "21.6.5" }, { "status": "affected", "version": "21.8.3" }, { "status": "affected", "version": "21.6.10" }, { "status": "affected", "version": "21.6.4" }, { "status": "affected", "version": "21.7.8" }, { "status": "affected", "version": "21.4.15" }, { "status": "affected", "version": "21.4.11" }, { "status": "affected", "version": "21.8.6" }, { "status": "affected", "version": "21.8.ca1" }, { "status": "affected", "version": "21.9.6" }, { "status": "affected", "version": "21.4.7" }, { "status": "affected", "version": "21.11.0" }, { "status": "affected", "version": "21.11.1" }, { "status": "affected", "version": "21.5.7" }, { "status": "affected", "version": "6.2.b4" }, { "status": "affected", "version": "21.7.7" }, { "status": "affected", "version": "21.6.b14" }, { "status": "affected", "version": "21.6.b13" }, { "status": "affected", "version": "21.6.b15" }, { "status": "affected", "version": "21.7.6" }, { "status": "affected", "version": "21.6.6" }, { "status": "affected", "version": "21.9.5" }, { "status": "affected", "version": "21.5.9" }, { "status": "affected", "version": "21.5.14" }, { "status": "affected", "version": "21.8.8" }, { "status": "affected", "version": "21.5.12" }, { "status": "affected", "version": "21.8.0" }, { "status": "affected", "version": "21.5.8" }, { "status": "affected", "version": "21.7.10" }, { "status": "affected", "version": "6.2.5" }, { "status": "affected", "version": "21.8.9" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "21.6.b17" }, { "status": "affected", "version": "21.6.b16" }, { "status": "affected", "version": "21.6.11" }, { "status": "affected", "version": "21.10.1" }, { "status": "affected", "version": "21.4.10" }, { "status": "affected", "version": "21.4.14" }, { "status": "affected", "version": "21.6.9" }, { "status": "affected", "version": "21.6.7" }, { "status": "affected", "version": "21.12.3" }, { "status": "affected", "version": "21.9.1" }, { "status": "affected", "version": "21.9.2" }, { "status": "affected", "version": "21.12.0" }, { "status": "affected", "version": "21.7.12" }, { "status": "affected", "version": "21.10.2" }, { "status": "affected", "version": "21.8.7" }, { "status": "affected", "version": "21.8.2" }, { "status": "affected", "version": "21.5.6" }, { "status": "affected", "version": "21.5.10" }, { "status": "affected", "version": "21.6.13" }, { "status": "affected", "version": "21.6.b18" }, { "status": "affected", "version": "21.7.11" }, { "status": "affected", "version": "21.7.1" }, { "status": "affected", "version": "21.9.3" }, { "status": "affected", "version": "21.7.0" }, { "status": "affected", "version": "21.5.11" }, { "status": "affected", "version": "21.5.17" }, { "status": "affected", "version": "21.5.4" }, { "status": "affected", "version": "21.7.3" }, { "status": "affected", "version": "21.4.1" }, { "status": "affected", "version": "21.4.3" }, { "status": "affected", "version": "21.7.2" }, { "status": "affected", "version": "21.4.5" }, { "status": "affected", "version": "21.5.2" }, { "status": "affected", "version": "21.6.3" }, { "status": "affected", "version": "21.6.0" }, { "status": "affected", "version": "21.6.2" }, { "status": "affected", "version": "21.5.5" }, { "status": "affected", "version": "21.4.6" }, { "status": "affected", "version": "21.4.0" }, { "status": "affected", "version": "21.4.2" }, { "status": "affected", "version": "21.4.4" }, { "status": "affected", "version": "21.7.4" }, { "status": "affected", "version": "21.5.0" }, { "status": "affected", "version": "21.5.1" }, { "status": "affected", "version": "21.6.1" }, { "status": "affected", "version": "21.5.3" }, { "status": "affected", "version": "21.19.n14" }, { "status": "affected", "version": "21.25.3" }, { "status": "affected", "version": "21.23.11" }, { "status": "affected", "version": "21.23.b3" }, { "status": "affected", "version": "21.20.c22" }, { "status": "affected", "version": "21.20.27" }, { "status": "affected", "version": "21.23.n7" }, { "status": "affected", "version": "21.20.26" }, { "status": "affected", "version": "21.23.12" }, { "status": "affected", "version": "21.20.28" }, { "status": "affected", "version": "21.22.ua5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a debug function for Cisco\u0026nbsp;RCM for Cisco\u0026nbsp;StarOS Software could allow an unauthenticated, remote attacker to perform debug actions that could result in the disclosure of confidential information that should be restricted.\r\nThis vulnerability exists because of a debug service that incorrectly listens to and accepts incoming connections. An attacker could exploit this vulnerability by connecting to the debug port and executing debug commands. A successful exploit could allow the attacker to view sensitive debugging information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:59:16.243Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-rcm-vuls-7cS3Nuq", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO" } ], "source": { "advisory": "cisco-sa-rcm-vuls-7cS3Nuq", "defects": [ "CSCvy80857" ], "discovery": "INTERNAL" }, "title": "Cisco Redundancy Configuration Manager Debug Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20648", "datePublished": "2024-11-15T15:59:16.243Z", "dateReserved": "2021-11-02T13:28:29.035Z", "dateUpdated": "2024-11-15T18:14:54.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20649 (GCVE-0-2022-20649)
Vulnerability from cvelistv5
Published
2024-11-15 15:59
Modified
2024-11-15 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-489 - Active Debug Code
Summary
A vulnerability in Cisco RCM for Cisco StarOS Software could allow an unauthenticated, remote attacker to perform remote code execution on the application with root-level privileges in the context of the configured container.
This vulnerability exists because the debug mode is incorrectly enabled for specific services. An attacker could exploit this vulnerability by connecting to the device and navigating to the service with debug mode enabled. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
The attacker would need to perform detailed reconnaissance to allow for unauthenticated access. The vulnerability can also be exploited by an authenticated attacker.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Redundancy Configuration Manager |
Version: 2021.02.0 Version: 2021.01.0 Version: 21.19.n13 Version: 21.17.19 Version: 21.18.24 Version: 21.25.0 Version: 21.15.60 Version: 21.22.11 Version: 21.20.25 Version: 21.20.21 Version: 21.24.2 Version: 21.23.10 Version: 21.22.n5 Version: 21.15.57 Version: 21.25.1 Version: 21.18.21 Version: 21.23.1 Version: 21.19.11 Version: 21.16.c16 Version: 21.23.5 Version: 21.22.4 Version: 21.22.ua2 Version: 21.23.n6 Version: 21.17.18 Version: 21.17.17 Version: 21.21.KS2 Version: 21.20.23 Version: 21.20.15 Version: 21.20.p9 Version: 21.20.17 Version: 21.20.14 Version: 21.21.3 Version: 21.19.n9 Version: 21.23.0 Version: 21.5.30 Version: 21.22.n4 Version: 21.20.12 Version: 21.23.b2 Version: 21.20.13 Version: 21.18.22 Version: 21.18.23 Version: 21.20.24 Version: 21.23.6 Version: 21.21.1 Version: 21.23.8 Version: 21.11.20 Version: 21.15.58 Version: 21.24.0 Version: 21.18.18 Version: 21.20.u8 Version: 21.18.19 Version: 21.21.2 Version: 21.22.2 Version: 21.22.8 Version: 21.22.uj3 Version: 21.22.5 Version: 21.22.3 Version: 21.22.10 Version: 21.18.20 Version: 21.15.55 Version: 21.12.22 Version: 21.23.4 Version: 21.15.59 Version: 21.22.ua0 Version: 21.20.16 Version: 21.20.18 Version: 21.20.19 Version: 21.19.n7 Version: 21.20.20 Version: 21.19.n10 Version: 21.19.n11 Version: 21.22.7 Version: 21.22.ua3 Version: 21.19.n12 Version: 21.23.9 Version: 21.18.16 Version: 21.16.10 Version: 21.22.6 Version: 21.18.17 Version: 21.24.1 Version: 21.11.21 Version: 21.23.3 Version: 21.9.13 Version: 21.20.k8 Version: 21.19.n8 Version: 21.22.9 Version: 21.16.c17 Version: 21.16.9 Version: 21.23.2 Version: 21.20.22 Version: 21.18.7 Version: 21.19.6 Version: 21.23.7 Version: 21.11.16 Version: 21.18.13 Version: 21.15.47 Version: 21.19.n6 Version: 6.9.8 Version: 21.20.k6 Version: 21.20.6 Version: 21.19.10 Version: 21.19.n4 Version: 21.15.46 Version: 21.17.14 Version: 21.15.52 Version: 21.16.6 Version: 21.22.n3 Version: 21.15.54 Version: 21.18.15 Version: 21.18.11 Version: 21.18.8 Version: 21.12.20 Version: 21.5.28 Version: 21.20.11 Version: 21.8.12 Version: 21.19.7 Version: 21.19.5 Version: 21.11.19 Version: 21.16.c15 Version: 21.18.12 Version: 21.15.51 Version: 21.18.14 Version: 21.11.15 Version: 21.16.c14 Version: 21.20.4 Version: 21.20.7 Version: 21.14.b22 Version: 21.17.10 Version: 21.12.21 Version: 21.19.9 Version: 21.13.21 Version: 21.14.23 Version: 21.20.UV0 Version: 21.10.6 Version: 21.15.45 Version: 21.15.53 Version: 21.17.15 Version: 21.17.16 Version: 6.14.2 Version: 21.19.n3 Version: 21.17.11 Version: 21.21.0 Version: 21.20.10 Version: 21.20.3 Version: 21.20.5 Version: 21.16.7 Version: 21.22.1 Version: 21.17.9 Version: 21.17.13 Version: 21.20.2 Version: 21.20.9 Version: 21.5.27 Version: 21.14.22 Version: 21.19.8 Version: 21.22.n2 Version: 21.16.8 Version: 21.11.17 Version: 21.20.8 Version: 21.20.k7 Version: 21.18.9 Version: 21.19.n5 Version: 21.11.18 Version: 21.5.29 Version: 21.15.48 Version: 21.22.0 Version: 21.14.b19 Version: 21.15.17 Version: 21.16.c4 Version: 21.19.2 Version: 6.2.b17 Version: 6.9.7 Version: 21.16.c6 Version: 21.17.8 Version: 21.11.13 Version: 21.12.19 Version: 21.12.18 Version: 21.6.15 Version: 21.20.0 Version: 6.13.EY2 Version: 21.15.36 Version: 21.15.21 Version: 21.15.43 Version: 6.14.0 Version: 21.14.b15 Version: 21.15.14 Version: 21.15.15 Version: 21.16.c7 Version: 21.16.c3 Version: 6.13.EY1 Version: 21.15.13 Version: 21.12.15 Version: 21.5.25 Version: 21.14.b12 Version: 21.18.6 Version: 21.19.4 Version: 21.17.3 Version: 21.16.c5 Version: 21.14.b21 Version: 21.18.1 Version: 6.11.0 Version: 21.14.17 Version: 21.5.26 Version: 21.14.b13 Version: 21.14.b16 Version: 21.15.22 Version: 21.15.23 Version: 21.16.3 Version: 21.16.c10 Version: 21.16.d1 Version: 21.15.28 Version: 21.11.11 Version: 21.15.30 Version: 21.15.29 Version: 21.13.18 Version: 21.12.16 Version: 21.17.5 Version: 21.14.b18 Version: 21.14.RH0 Version: 21.14.b14 Version: 6.6.7 Version: 21.15.20 Version: 21.15.32 Version: 21.14.18 Version: 21.6.b25 Version: 21.17.2 Version: 6.2.b15 Version: 21.15.33 Version: 21.13.19 Version: 6.2.b14 Version: 21.19.n1 Version: 21.19.1 Version: 21.19.0 Version: 21.6.b26 Version: 6.2.b16 Version: 21.11.12 Version: 21.18.3 Version: 21.17.7 Version: 21.14.12 Version: 21.19.n2 Version: 21.16.c11 Version: 21.16.c12 Version: 6.10.0 Version: 21.16.4 Version: 6.13.0 Version: 21.13.16 Version: 21.16.c13 Version: 21.17.1 Version: 21.17.6 Version: 21.12.17 Version: 21.11.10 Version: 21.20.SV1 Version: 21.11.14 Version: 6.11.1 Version: 21.17.0 Version: 21.9.12 Version: 21.20.1 Version: 21.14.19 Version: 21.14.c3 Version: 21.15.18 Version: 21.15.19 Version: 21.15.16 Version: 21.15.39 Version: 6.6.6 Version: 21.14.11 Version: 21.14.b17 Version: 21.14.16 Version: 21.15.24 Version: 21.6.b24 Version: 21.16.c9 Version: 21.16.c8 Version: 6.8.1 Version: 21.15.27 Version: 21.15.26 Version: 21.15.25 Version: 21.17.4 Version: 21.13.17 Version: 6.9.5 Version: 21.18.5 Version: 21.15.40 Version: 6.12.0 Version: 21.18.2 Version: 21.12.14 Version: 21.16.d0 Version: 21.14.20 Version: 21.18.0 Version: 21.15.37 Version: 21.15.41 Version: 21.18.4 Version: 21.20.SV2 Version: 21.20.SV3 Version: 21.16.5 Version: 21.20.SV5 Version: 5.1.15 Version: 21.19.3 Version: 21.13.20 Version: 21.14.b20 Version: 21.15.7 Version: 21.13.15 Version: 21.15.11 Version: 21.15.9 Version: 21.15.0 Version: 21.10.4 Version: 21.12.12 Version: 21.12.4 Version: 21.12.8 Version: 21.15.5 Version: 21.13.8 Version: 21.8.10 Version: 21.14.6 Version: 21.15.1 Version: 21.8.11 Version: 21.4.16 Version: 21.9.11 Version: 21.16.c0 Version: 21.13.14 Version: 21.13.4 Version: 21.14.7 Version: 21.14.8 Version: 21.9.8 Version: 21.16.c2 Version: 21.15.10 Version: 21.15.2 Version: 21.15.6 Version: 6.7.0 Version: 21.13.6 Version: 21.9.10 Version: 21.14.1 Version: 21.7.13 Version: 21.11.8 Version: 21.14.2 Version: 21.14.0 Version: 21.12.10 Version: 21.9.9 Version: 21.13.5 Version: 21.13.2 Version: 21.13.9 Version: 21.13.10 Version: 21.12.5 Version: 21.12.9 Version: 21.5.23 Version: 21.14.10 Version: 21.14.c2 Version: 21.14.9 Version: 21.11.6 Version: 21.5.20 Version: 21.13.12 Version: 21.15.12 Version: 6.9.2 Version: 21.15.4 Version: 21.13.11 Version: 21.13.7 Version: 21.10.5 Version: 21.6.b19 Version: 21.6.b23 Version: 21.13.0 Version: 21.6.14 Version: 21.13.13 Version: 21.4.17 Version: 21.11.9 Version: 21.11.2 Version: 21.15.8 Version: 21.16.2 Version: 21.16.1 Version: 21.16.c1 Version: 21.5.21 Version: 21.11.4 Version: 21.6.b21 Version: 21.14.a5 Version: 21.10.3 Version: 21.11.5 Version: 21.13.3 Version: 21.5.22 Version: 21.12.7 Version: 21.12.13 Version: 21.12.6 Version: 21.5.19 Version: 21.6.b22 Version: 21.11.7 Version: 21.13.1 Version: 21.14.a0 Version: 21.14.4 Version: 21.14.5 Version: 21.5.24 Version: 21.14.3 Version: 21.16.0 Version: 21.6.b20 Version: 21.7.5 Version: 21.15.3 Version: 21.6.12 Version: 21.8.5 Version: 21.9.7 Version: 21.12.11 Version: 21.12.2 Version: 6.2.b6 Version: 21.8.4 Version: 6.2.b5 Version: 21.5.15 Version: 21.8.1 Version: 21.4.13 Version: 21.10.0 Version: 21.5.13 Version: 21.9.0 Version: 21.9.4 Version: 21.4.9 Version: 21.4.12 Version: 21.11.3 Version: 21.5.16 Version: 21.7.9 Version: 6.5.0 Version: 21.4.8 Version: 21.6.8 Version: 21.6.5 Version: 21.8.3 Version: 21.6.10 Version: 21.6.4 Version: 21.7.8 Version: 21.4.15 Version: 21.4.11 Version: 21.8.6 Version: 21.8.ca1 Version: 21.9.6 Version: 21.4.7 Version: 21.11.0 Version: 21.11.1 Version: 21.5.7 Version: 6.2.b4 Version: 21.7.7 Version: 21.6.b14 Version: 21.6.b13 Version: 21.6.b15 Version: 21.7.6 Version: 21.6.6 Version: 21.9.5 Version: 21.5.9 Version: 21.5.14 Version: 21.8.8 Version: 21.5.12 Version: 21.8.0 Version: 21.5.8 Version: 21.7.10 Version: 6.2.5 Version: 21.8.9 Version: 6.4.0 Version: 21.6.b17 Version: 21.6.b16 Version: 21.6.11 Version: 21.10.1 Version: 21.4.10 Version: 21.4.14 Version: 21.6.9 Version: 21.6.7 Version: 21.12.3 Version: 21.9.1 Version: 21.9.2 Version: 21.12.0 Version: 21.7.12 Version: 21.10.2 Version: 21.8.7 Version: 21.8.2 Version: 21.5.6 Version: 21.5.10 Version: 21.6.13 Version: 21.6.b18 Version: 21.7.11 Version: 21.7.1 Version: 21.9.3 Version: 21.7.0 Version: 21.5.11 Version: 21.5.17 Version: 21.5.4 Version: 21.7.3 Version: 21.4.1 Version: 21.4.3 Version: 21.7.2 Version: 21.4.5 Version: 21.5.2 Version: 21.6.3 Version: 21.6.0 Version: 21.6.2 Version: 21.5.5 Version: 21.4.6 Version: 21.4.0 Version: 21.4.2 Version: 21.4.4 Version: 21.7.4 Version: 21.5.0 Version: 21.5.1 Version: 21.6.1 Version: 21.5.3 Version: 21.19.n14 Version: 21.25.3 Version: 21.23.11 Version: 21.23.b3 Version: 21.20.c22 Version: 21.20.27 Version: 21.23.n7 Version: 21.20.26 Version: 21.23.12 Version: 21.20.28 Version: 21.22.ua5 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:redundancy_configuration_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "redundancy_configuration_manager", "vendor": "cisco", "versions": [ { "lessThan": "21.25.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-20649", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T19:40:41.090546Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T19:41:58.793Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Redundancy Configuration Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2021.02.0" }, { "status": "affected", "version": "2021.01.0" }, { "status": "affected", "version": "21.19.n13" }, { "status": "affected", "version": "21.17.19" }, { "status": "affected", "version": "21.18.24" }, { "status": "affected", "version": "21.25.0" }, { "status": "affected", "version": "21.15.60" }, { "status": "affected", "version": "21.22.11" }, { "status": "affected", "version": "21.20.25" }, { "status": "affected", "version": "21.20.21" }, { "status": "affected", "version": "21.24.2" }, { "status": "affected", "version": "21.23.10" }, { "status": "affected", "version": "21.22.n5" }, { "status": "affected", "version": "21.15.57" }, { "status": "affected", "version": "21.25.1" }, { "status": "affected", "version": "21.18.21" }, { "status": "affected", "version": "21.23.1" }, { "status": "affected", "version": "21.19.11" }, { "status": "affected", "version": "21.16.c16" }, { "status": "affected", "version": "21.23.5" }, { "status": "affected", "version": "21.22.4" }, { "status": "affected", "version": "21.22.ua2" }, { "status": "affected", "version": "21.23.n6" }, { "status": "affected", "version": "21.17.18" }, { "status": "affected", "version": "21.17.17" }, { "status": "affected", "version": "21.21.KS2" }, { "status": "affected", "version": "21.20.23" }, { "status": "affected", "version": "21.20.15" }, { "status": "affected", "version": "21.20.p9" }, { "status": "affected", "version": "21.20.17" }, { "status": "affected", "version": "21.20.14" }, { "status": "affected", "version": "21.21.3" }, { "status": "affected", "version": "21.19.n9" }, { "status": "affected", "version": "21.23.0" }, { "status": "affected", "version": "21.5.30" }, { "status": "affected", "version": "21.22.n4" }, { "status": "affected", "version": "21.20.12" }, { "status": "affected", "version": "21.23.b2" }, { "status": "affected", "version": "21.20.13" }, { "status": "affected", "version": "21.18.22" }, { "status": "affected", "version": "21.18.23" }, { "status": "affected", "version": "21.20.24" }, { "status": "affected", "version": "21.23.6" }, { "status": "affected", "version": "21.21.1" }, { "status": "affected", "version": "21.23.8" }, { "status": "affected", "version": "21.11.20" }, { "status": "affected", "version": "21.15.58" }, { "status": "affected", "version": "21.24.0" }, { "status": "affected", "version": "21.18.18" }, { "status": "affected", "version": "21.20.u8" }, { "status": "affected", "version": "21.18.19" }, { "status": "affected", "version": "21.21.2" }, { "status": "affected", "version": "21.22.2" }, { "status": "affected", "version": "21.22.8" }, { "status": "affected", "version": "21.22.uj3" }, { "status": "affected", "version": "21.22.5" }, { "status": "affected", "version": "21.22.3" }, { "status": "affected", "version": "21.22.10" }, { "status": "affected", "version": "21.18.20" }, { "status": "affected", "version": "21.15.55" }, { "status": "affected", "version": "21.12.22" }, { "status": "affected", "version": "21.23.4" }, { "status": "affected", "version": "21.15.59" }, { "status": "affected", "version": "21.22.ua0" }, { "status": "affected", "version": "21.20.16" }, { "status": "affected", "version": "21.20.18" }, { "status": "affected", "version": "21.20.19" }, { "status": "affected", "version": "21.19.n7" }, { "status": "affected", "version": "21.20.20" }, { "status": "affected", "version": "21.19.n10" }, { "status": "affected", "version": "21.19.n11" }, { "status": "affected", "version": "21.22.7" }, { "status": "affected", "version": "21.22.ua3" }, { "status": "affected", "version": "21.19.n12" }, { "status": "affected", "version": "21.23.9" }, { "status": "affected", "version": "21.18.16" }, { "status": "affected", "version": "21.16.10" }, { "status": "affected", "version": "21.22.6" }, { "status": "affected", "version": "21.18.17" }, { "status": "affected", "version": "21.24.1" }, { "status": "affected", "version": "21.11.21" }, { "status": "affected", "version": "21.23.3" }, { "status": "affected", "version": "21.9.13" }, { "status": "affected", "version": "21.20.k8" }, { "status": "affected", "version": "21.19.n8" }, { "status": "affected", "version": "21.22.9" }, { "status": "affected", "version": "21.16.c17" }, { "status": "affected", "version": "21.16.9" }, { "status": "affected", "version": "21.23.2" }, { "status": "affected", "version": "21.20.22" }, { "status": "affected", "version": "21.18.7" }, { "status": "affected", "version": "21.19.6" }, { "status": "affected", "version": "21.23.7" }, { "status": "affected", "version": "21.11.16" }, { "status": "affected", "version": "21.18.13" }, { "status": "affected", "version": "21.15.47" }, { "status": "affected", "version": "21.19.n6" }, { "status": "affected", "version": "6.9.8" }, { "status": "affected", "version": "21.20.k6" }, { "status": "affected", "version": "21.20.6" }, { "status": "affected", "version": "21.19.10" }, { "status": "affected", "version": "21.19.n4" }, { "status": "affected", "version": "21.15.46" }, { "status": "affected", "version": "21.17.14" }, { "status": "affected", "version": "21.15.52" }, { "status": "affected", "version": "21.16.6" }, { "status": "affected", "version": "21.22.n3" }, { "status": "affected", "version": "21.15.54" }, { "status": "affected", "version": "21.18.15" }, { "status": "affected", "version": "21.18.11" }, { "status": "affected", "version": "21.18.8" }, { "status": "affected", "version": "21.12.20" }, { "status": "affected", "version": "21.5.28" }, { "status": "affected", "version": "21.20.11" }, { "status": "affected", "version": "21.8.12" }, { "status": "affected", "version": "21.19.7" }, { "status": "affected", "version": "21.19.5" }, { "status": "affected", "version": "21.11.19" }, { "status": "affected", "version": "21.16.c15" }, { "status": "affected", "version": "21.18.12" }, { "status": "affected", "version": "21.15.51" }, { "status": "affected", "version": "21.18.14" }, { "status": "affected", "version": "21.11.15" }, { "status": "affected", "version": "21.16.c14" }, { "status": "affected", "version": "21.20.4" }, { "status": "affected", "version": "21.20.7" }, { "status": "affected", "version": "21.14.b22" }, { "status": "affected", "version": "21.17.10" }, { "status": "affected", "version": "21.12.21" }, { "status": "affected", "version": "21.19.9" }, { "status": "affected", "version": "21.13.21" }, { "status": "affected", "version": "21.14.23" }, { "status": "affected", "version": "21.20.UV0" }, { "status": "affected", "version": "21.10.6" }, { "status": "affected", "version": "21.15.45" }, { "status": "affected", "version": "21.15.53" }, { "status": "affected", "version": "21.17.15" }, { "status": "affected", "version": "21.17.16" }, { "status": "affected", "version": "6.14.2" }, { "status": "affected", "version": "21.19.n3" }, { "status": "affected", "version": "21.17.11" }, { "status": "affected", "version": "21.21.0" }, { "status": "affected", "version": "21.20.10" }, { "status": "affected", "version": "21.20.3" }, { "status": "affected", "version": "21.20.5" }, { "status": "affected", "version": "21.16.7" }, { "status": "affected", "version": "21.22.1" }, { "status": "affected", "version": "21.17.9" }, { "status": "affected", "version": "21.17.13" }, { "status": "affected", "version": "21.20.2" }, { "status": "affected", "version": "21.20.9" }, { "status": "affected", "version": "21.5.27" }, { "status": "affected", "version": "21.14.22" }, { "status": "affected", "version": "21.19.8" }, { "status": "affected", "version": "21.22.n2" }, { "status": "affected", "version": "21.16.8" }, { "status": "affected", "version": "21.11.17" }, { "status": "affected", "version": "21.20.8" }, { "status": "affected", "version": "21.20.k7" }, { "status": "affected", "version": "21.18.9" }, { "status": "affected", "version": "21.19.n5" }, { "status": "affected", "version": "21.11.18" }, { "status": "affected", "version": "21.5.29" }, { "status": "affected", "version": "21.15.48" }, { "status": "affected", "version": "21.22.0" }, { "status": "affected", "version": "21.14.b19" }, { "status": "affected", "version": "21.15.17" }, { "status": "affected", "version": "21.16.c4" }, { "status": "affected", "version": "21.19.2" }, { "status": "affected", "version": "6.2.b17" }, { "status": "affected", "version": "6.9.7" }, { "status": "affected", "version": "21.16.c6" }, { "status": "affected", "version": "21.17.8" }, { "status": "affected", "version": "21.11.13" }, { "status": "affected", "version": "21.12.19" }, { "status": "affected", "version": "21.12.18" }, { "status": "affected", "version": "21.6.15" }, { "status": "affected", "version": "21.20.0" }, { "status": "affected", "version": "6.13.EY2" }, { "status": "affected", "version": "21.15.36" }, { "status": "affected", "version": "21.15.21" }, { "status": "affected", "version": "21.15.43" }, { "status": "affected", "version": "6.14.0" }, { "status": "affected", "version": "21.14.b15" }, { "status": "affected", "version": "21.15.14" }, { "status": "affected", "version": "21.15.15" }, { "status": "affected", "version": "21.16.c7" }, { "status": "affected", "version": "21.16.c3" }, { "status": "affected", "version": "6.13.EY1" }, { "status": "affected", "version": "21.15.13" }, { "status": "affected", "version": "21.12.15" }, { "status": "affected", "version": "21.5.25" }, { "status": "affected", "version": "21.14.b12" }, { "status": "affected", "version": "21.18.6" }, { "status": "affected", "version": "21.19.4" }, { "status": "affected", "version": "21.17.3" }, { "status": "affected", "version": "21.16.c5" }, { "status": "affected", "version": "21.14.b21" }, { "status": "affected", "version": "21.18.1" }, { "status": "affected", "version": "6.11.0" }, { "status": "affected", "version": "21.14.17" }, { "status": "affected", "version": "21.5.26" }, { "status": "affected", "version": "21.14.b13" }, { "status": "affected", "version": "21.14.b16" }, { "status": "affected", "version": "21.15.22" }, { "status": "affected", "version": "21.15.23" }, { "status": "affected", "version": "21.16.3" }, { "status": "affected", "version": "21.16.c10" }, { "status": "affected", "version": "21.16.d1" }, { "status": "affected", "version": "21.15.28" }, { "status": "affected", "version": "21.11.11" }, { "status": "affected", "version": "21.15.30" }, { "status": "affected", "version": "21.15.29" }, { "status": "affected", "version": "21.13.18" }, { "status": "affected", "version": "21.12.16" }, { "status": "affected", "version": "21.17.5" }, { "status": "affected", "version": "21.14.b18" }, { "status": "affected", "version": "21.14.RH0" }, { "status": "affected", "version": "21.14.b14" }, { "status": "affected", "version": "6.6.7" }, { "status": "affected", "version": "21.15.20" }, { "status": "affected", "version": "21.15.32" }, { "status": "affected", "version": "21.14.18" }, { "status": "affected", "version": "21.6.b25" }, { "status": "affected", "version": "21.17.2" }, { "status": "affected", "version": "6.2.b15" }, { "status": "affected", "version": "21.15.33" }, { "status": "affected", "version": "21.13.19" }, { "status": "affected", "version": "6.2.b14" }, { "status": "affected", "version": "21.19.n1" }, { "status": "affected", "version": "21.19.1" }, { "status": "affected", "version": "21.19.0" }, { "status": "affected", "version": "21.6.b26" }, { "status": "affected", "version": "6.2.b16" }, { "status": "affected", "version": "21.11.12" }, { "status": "affected", "version": "21.18.3" }, { "status": "affected", "version": "21.17.7" }, { "status": "affected", "version": "21.14.12" }, { "status": "affected", "version": "21.19.n2" }, { "status": "affected", "version": "21.16.c11" }, { "status": "affected", "version": "21.16.c12" }, { "status": "affected", "version": "6.10.0" }, { "status": "affected", "version": "21.16.4" }, { "status": "affected", "version": "6.13.0" }, { "status": "affected", "version": "21.13.16" }, { "status": "affected", "version": "21.16.c13" }, { "status": "affected", "version": "21.17.1" }, { "status": "affected", "version": "21.17.6" }, { "status": "affected", "version": "21.12.17" }, { "status": "affected", "version": "21.11.10" }, { "status": "affected", "version": "21.20.SV1" }, { "status": "affected", "version": "21.11.14" }, { "status": "affected", "version": "6.11.1" }, { "status": "affected", "version": "21.17.0" }, { "status": "affected", "version": "21.9.12" }, { "status": "affected", "version": "21.20.1" }, { "status": "affected", "version": "21.14.19" }, { "status": "affected", "version": "21.14.c3" }, { "status": "affected", "version": "21.15.18" }, { "status": "affected", "version": "21.15.19" }, { "status": "affected", "version": "21.15.16" }, { "status": "affected", "version": "21.15.39" }, { "status": "affected", "version": "6.6.6" }, { "status": "affected", "version": "21.14.11" }, { "status": "affected", "version": "21.14.b17" }, { "status": "affected", "version": "21.14.16" }, { "status": "affected", "version": "21.15.24" }, { "status": "affected", "version": "21.6.b24" }, { "status": "affected", "version": "21.16.c9" }, { "status": "affected", "version": "21.16.c8" }, { "status": "affected", "version": "6.8.1" }, { "status": "affected", "version": "21.15.27" }, { "status": "affected", "version": "21.15.26" }, { "status": "affected", "version": "21.15.25" }, { "status": "affected", "version": "21.17.4" }, { "status": "affected", "version": "21.13.17" }, { "status": "affected", "version": "6.9.5" }, { "status": "affected", "version": "21.18.5" }, { "status": "affected", "version": "21.15.40" }, { "status": "affected", "version": "6.12.0" }, { "status": "affected", "version": "21.18.2" }, { "status": "affected", "version": "21.12.14" }, { "status": "affected", "version": "21.16.d0" }, { "status": "affected", "version": "21.14.20" }, { "status": "affected", "version": "21.18.0" }, { "status": "affected", "version": "21.15.37" }, { "status": "affected", "version": "21.15.41" }, { "status": "affected", "version": "21.18.4" }, { "status": "affected", "version": "21.20.SV2" }, { "status": "affected", "version": "21.20.SV3" }, { "status": "affected", "version": "21.16.5" }, { "status": "affected", "version": "21.20.SV5" }, { "status": "affected", "version": "5.1.15" }, { "status": "affected", "version": "21.19.3" }, { "status": "affected", "version": "21.13.20" }, { "status": "affected", "version": "21.14.b20" }, { "status": "affected", "version": "21.15.7" }, { "status": "affected", "version": "21.13.15" }, { "status": "affected", "version": "21.15.11" }, { "status": "affected", "version": "21.15.9" }, { "status": "affected", "version": "21.15.0" }, { "status": "affected", "version": "21.10.4" }, { "status": "affected", "version": "21.12.12" }, { "status": "affected", "version": "21.12.4" }, { "status": "affected", "version": "21.12.8" }, { "status": "affected", "version": "21.15.5" }, { "status": "affected", "version": "21.13.8" }, { "status": "affected", "version": "21.8.10" }, { "status": "affected", "version": "21.14.6" }, { "status": "affected", "version": "21.15.1" }, { "status": "affected", "version": "21.8.11" }, { "status": "affected", "version": "21.4.16" }, { "status": "affected", "version": "21.9.11" }, { "status": "affected", "version": "21.16.c0" }, { "status": "affected", "version": "21.13.14" }, { "status": "affected", "version": "21.13.4" }, { "status": "affected", "version": "21.14.7" }, { "status": "affected", "version": "21.14.8" }, { "status": "affected", "version": "21.9.8" }, { "status": "affected", "version": "21.16.c2" }, { "status": "affected", "version": "21.15.10" }, { "status": "affected", "version": "21.15.2" }, { "status": "affected", "version": "21.15.6" }, { "status": "affected", "version": "6.7.0" }, { "status": "affected", "version": "21.13.6" }, { "status": "affected", "version": "21.9.10" }, { "status": "affected", "version": "21.14.1" }, { "status": "affected", "version": "21.7.13" }, { "status": "affected", "version": "21.11.8" }, { "status": "affected", "version": "21.14.2" }, { "status": "affected", "version": "21.14.0" }, { "status": "affected", "version": "21.12.10" }, { "status": "affected", "version": "21.9.9" }, { "status": "affected", "version": "21.13.5" }, { "status": "affected", "version": "21.13.2" }, { "status": "affected", "version": "21.13.9" }, { "status": "affected", "version": "21.13.10" }, { "status": "affected", "version": "21.12.5" }, { "status": "affected", "version": "21.12.9" }, { "status": "affected", "version": "21.5.23" }, { "status": "affected", "version": "21.14.10" }, { "status": "affected", "version": "21.14.c2" }, { "status": "affected", "version": "21.14.9" }, { "status": "affected", "version": "21.11.6" }, { "status": "affected", "version": "21.5.20" }, { "status": "affected", "version": "21.13.12" }, { "status": "affected", "version": "21.15.12" }, { "status": "affected", "version": "6.9.2" }, { "status": "affected", "version": "21.15.4" }, { "status": "affected", "version": "21.13.11" }, { "status": "affected", "version": "21.13.7" }, { "status": "affected", "version": "21.10.5" }, { "status": "affected", "version": "21.6.b19" }, { "status": "affected", "version": "21.6.b23" }, { "status": "affected", "version": "21.13.0" }, { "status": "affected", "version": "21.6.14" }, { "status": "affected", "version": "21.13.13" }, { "status": "affected", "version": "21.4.17" }, { "status": "affected", "version": "21.11.9" }, { "status": "affected", "version": "21.11.2" }, { "status": "affected", "version": "21.15.8" }, { "status": "affected", "version": "21.16.2" }, { "status": "affected", "version": "21.16.1" }, { "status": "affected", "version": "21.16.c1" }, { "status": "affected", "version": "21.5.21" }, { "status": "affected", "version": "21.11.4" }, { "status": "affected", "version": "21.6.b21" }, { "status": "affected", "version": "21.14.a5" }, { "status": "affected", "version": "21.10.3" }, { "status": "affected", "version": "21.11.5" }, { "status": "affected", "version": "21.13.3" }, { "status": "affected", "version": "21.5.22" }, { "status": "affected", "version": "21.12.7" }, { "status": "affected", "version": "21.12.13" }, { "status": "affected", "version": "21.12.6" }, { "status": "affected", "version": "21.5.19" }, { "status": "affected", "version": "21.6.b22" }, { "status": "affected", "version": "21.11.7" }, { "status": "affected", "version": "21.13.1" }, { "status": "affected", "version": "21.14.a0" }, { "status": "affected", "version": "21.14.4" }, { "status": "affected", "version": "21.14.5" }, { "status": "affected", "version": "21.5.24" }, { "status": "affected", "version": "21.14.3" }, { "status": "affected", "version": "21.16.0" }, { "status": "affected", "version": "21.6.b20" }, { "status": "affected", "version": "21.7.5" }, { "status": "affected", "version": "21.15.3" }, { "status": "affected", "version": "21.6.12" }, { "status": "affected", "version": "21.8.5" }, { "status": "affected", "version": "21.9.7" }, { "status": "affected", "version": "21.12.11" }, { "status": "affected", "version": "21.12.2" }, { "status": "affected", "version": "6.2.b6" }, { "status": "affected", "version": "21.8.4" }, { "status": "affected", "version": "6.2.b5" }, { "status": "affected", "version": "21.5.15" }, { "status": "affected", "version": "21.8.1" }, { "status": "affected", "version": "21.4.13" }, { "status": "affected", "version": "21.10.0" }, { "status": "affected", "version": "21.5.13" }, { "status": "affected", "version": "21.9.0" }, { "status": "affected", "version": "21.9.4" }, { "status": "affected", "version": "21.4.9" }, { "status": "affected", "version": "21.4.12" }, { "status": "affected", "version": "21.11.3" }, { "status": "affected", "version": "21.5.16" }, { "status": "affected", "version": "21.7.9" }, { "status": "affected", "version": "6.5.0" }, { "status": "affected", "version": "21.4.8" }, { "status": "affected", "version": "21.6.8" }, { "status": "affected", "version": "21.6.5" }, { "status": "affected", "version": "21.8.3" }, { "status": "affected", "version": "21.6.10" }, { "status": "affected", "version": "21.6.4" }, { "status": "affected", "version": "21.7.8" }, { "status": "affected", "version": "21.4.15" }, { "status": "affected", "version": "21.4.11" }, { "status": "affected", "version": "21.8.6" }, { "status": "affected", "version": "21.8.ca1" }, { "status": "affected", "version": "21.9.6" }, { "status": "affected", "version": "21.4.7" }, { "status": "affected", "version": "21.11.0" }, { "status": "affected", "version": "21.11.1" }, { "status": "affected", "version": "21.5.7" }, { "status": "affected", "version": "6.2.b4" }, { "status": "affected", "version": "21.7.7" }, { "status": "affected", "version": "21.6.b14" }, { "status": "affected", "version": "21.6.b13" }, { "status": "affected", "version": "21.6.b15" }, { "status": "affected", "version": "21.7.6" }, { "status": "affected", "version": "21.6.6" }, { "status": "affected", "version": "21.9.5" }, { "status": "affected", "version": "21.5.9" }, { "status": "affected", "version": "21.5.14" }, { "status": "affected", "version": "21.8.8" }, { "status": "affected", "version": "21.5.12" }, { "status": "affected", "version": "21.8.0" }, { "status": "affected", "version": "21.5.8" }, { "status": "affected", "version": "21.7.10" }, { "status": "affected", "version": "6.2.5" }, { "status": "affected", "version": "21.8.9" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "21.6.b17" }, { "status": "affected", "version": "21.6.b16" }, { "status": "affected", "version": "21.6.11" }, { "status": "affected", "version": "21.10.1" }, { "status": "affected", "version": "21.4.10" }, { "status": "affected", "version": "21.4.14" }, { "status": "affected", "version": "21.6.9" }, { "status": "affected", "version": "21.6.7" }, { "status": "affected", "version": "21.12.3" }, { "status": "affected", "version": "21.9.1" }, { "status": "affected", "version": "21.9.2" }, { "status": "affected", "version": "21.12.0" }, { "status": "affected", "version": "21.7.12" }, { "status": "affected", "version": "21.10.2" }, { "status": "affected", "version": "21.8.7" }, { "status": "affected", "version": "21.8.2" }, { "status": "affected", "version": "21.5.6" }, { "status": "affected", "version": "21.5.10" }, { "status": "affected", "version": "21.6.13" }, { "status": "affected", "version": "21.6.b18" }, { "status": "affected", "version": "21.7.11" }, { "status": "affected", "version": "21.7.1" }, { "status": "affected", "version": "21.9.3" }, { "status": "affected", "version": "21.7.0" }, { "status": "affected", "version": "21.5.11" }, { "status": "affected", "version": "21.5.17" }, { "status": "affected", "version": "21.5.4" }, { "status": "affected", "version": "21.7.3" }, { "status": "affected", "version": "21.4.1" }, { "status": "affected", "version": "21.4.3" }, { "status": "affected", "version": "21.7.2" }, { "status": "affected", "version": "21.4.5" }, { "status": "affected", "version": "21.5.2" }, { "status": "affected", "version": "21.6.3" }, { "status": "affected", "version": "21.6.0" }, { "status": "affected", "version": "21.6.2" }, { "status": "affected", "version": "21.5.5" }, { "status": "affected", "version": "21.4.6" }, { "status": "affected", "version": "21.4.0" }, { "status": "affected", "version": "21.4.2" }, { "status": "affected", "version": "21.4.4" }, { "status": "affected", "version": "21.7.4" }, { "status": "affected", "version": "21.5.0" }, { "status": "affected", "version": "21.5.1" }, { "status": "affected", "version": "21.6.1" }, { "status": "affected", "version": "21.5.3" }, { "status": "affected", "version": "21.19.n14" }, { "status": "affected", "version": "21.25.3" }, { "status": "affected", "version": "21.23.11" }, { "status": "affected", "version": "21.23.b3" }, { "status": "affected", "version": "21.20.c22" }, { "status": "affected", "version": "21.20.27" }, { "status": "affected", "version": "21.23.n7" }, { "status": "affected", "version": "21.20.26" }, { "status": "affected", "version": "21.23.12" }, { "status": "affected", "version": "21.20.28" }, { "status": "affected", "version": "21.22.ua5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco\u0026nbsp;RCM for Cisco\u0026nbsp;StarOS Software could allow an unauthenticated, remote attacker to perform remote code execution on the application with root-level privileges\u0026nbsp;in the context of the configured container.\r\n\r\nThis vulnerability exists because the debug mode is incorrectly enabled for specific services. An attacker could exploit this vulnerability by connecting to the device and navigating to the service with debug mode enabled. A successful exploit could allow the attacker to execute arbitrary commands as the root user.\r\nThe attacker would need to perform detailed reconnaissance to allow for unauthenticated access. The vulnerability can also be exploited by an authenticated attacker.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-489", "description": "Active Debug Code", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:59:07.107Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-rcm-vuls-7cS3Nuq", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO" } ], "source": { "advisory": "cisco-sa-rcm-vuls-7cS3Nuq", "defects": [ "CSCvy80878" ], "discovery": "INTERNAL" }, "title": "Cisco Redundancy Configuration Manager Debug Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20649", "datePublished": "2024-11-15T15:59:07.107Z", "dateReserved": "2021-11-02T13:28:29.035Z", "dateUpdated": "2024-11-15T19:41:58.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-20685 (GCVE-0-2022-20685)
Vulnerability from cvelistv5
Published
2024-11-15 15:36
Modified
2025-01-27 17:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cisco | Cisco Cyber Vision |
Version: 3.0.0 Version: 3.0.2 Version: 3.0.3 Version: 3.0.1 Version: 3.1.0 Version: 3.0.4 Version: 3.1.1 Version: 3.1.2 Version: 3.2.0 Version: 3.0.5 Version: 3.2.1 Version: 3.0.6 Version: 3.2.2 Version: 3.2.3 Version: 3.2.4 Version: 4.0.0 Version: 4.0.1 |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-20685", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:20:05.316414Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-27T17:48:32.910Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Cyber Vision", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.3" }, { "status": "affected", "version": "3.2.4" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.0.1" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.2.3.14" }, { "status": "affected", "version": "6.4.0.1" }, { "status": "affected", "version": "6.2.3.7" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.4.0.2" }, { "status": "affected", "version": "6.2.3.9" }, { "status": "affected", "version": "6.2.3.1" }, { "status": "affected", "version": "6.2.3.2" }, { "status": "affected", "version": "6.4.0.5" }, { "status": "affected", "version": "6.2.3.10" }, { "status": "affected", "version": "6.4.0" }, { "status": "affected", "version": "6.4.0.3" }, { "status": "affected", "version": "6.2.3.6" }, { "status": "affected", "version": "6.4.0.4" }, { "status": "affected", "version": "6.2.3.15" }, { "status": "affected", "version": "6.2.3.5" }, { "status": "affected", "version": "6.2.3.4" }, { "status": "affected", "version": "6.2.3.3" }, { "status": "affected", "version": "6.2.3.8" }, { "status": "affected", "version": "6.4.0.6" }, { "status": "affected", "version": "6.2.3.11" }, { "status": "affected", "version": "6.2.3.12" }, { "status": "affected", "version": "6.2.3.13" }, { "status": "affected", "version": "6.4.0.7" }, { "status": "affected", "version": "6.4.0.8" }, { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.4.0.9" }, { "status": "affected", "version": "6.2.3.16" }, { "status": "affected", "version": "6.6.0.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.4.0.10" }, { "status": "affected", "version": "6.7.0" }, { "status": "affected", "version": "6.4.0.11" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.7.0.1" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "6.4.0.12" }, { "status": "affected", "version": "6.7.0.2" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.2.3.17" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "6.6.5" }, { "status": "affected", "version": "6.2.3.18" }, { "status": "affected", "version": "6.7.0.3" } ] }, { "defaultStatus": "unknown", "product": "Cisco UTD SNORT IPS Engine Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.17.1S" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "Fuji-16.9.5" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "16.6.6" }, { "status": "affected", "version": "16.12.2" }, { "status": "affected", "version": "Fuji-16.9.6" }, { "status": "affected", "version": "3.17.0S" }, { "status": "affected", "version": "Fuji-16.9.3" }, { "status": "affected", "version": "Denali-16.3.7" }, { "status": "affected", "version": "Fuji-16.9.2" }, { "status": "affected", "version": "Fuji-16.9.4" }, { "status": "affected", "version": "Everest-16.6.4" }, { "status": "affected", "version": "Everest-16.6.3" }, { "status": "affected", "version": "16.6.5" }, { "status": "affected", "version": "Denali-16.3.5" }, { "status": "affected", "version": "17.2.1r" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "Everest-16.6.2" }, { "status": "affected", "version": "16.6.7a" }, { "status": "affected", "version": "Denali-16.3.4" }, { "status": "affected", "version": "16.6.1" }, { "status": "affected", "version": "Denali-16.3.9" }, { "status": "affected", "version": "Denali-16.3.3" }, { "status": "affected", "version": "16.12.1a" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "Fuji-16.9.7" }, { "status": "affected", "version": "16.6.9" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "16.6.10" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "Fuji-16.9.8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\nThis vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "Integer Overflow or Wraparound", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:36:31.261Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-snort-dos-9D3hJLuj", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ\u003c/a\u003e\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eAttention\u003c/strong\u003e: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see \u003ca href=\"https://www.cisco.com/c/en/us/products/security/secure-names.html\"\u003eMeet Cisco\u0026nbsp;Secure", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ" } ], "source": { "advisory": "cisco-sa-snort-dos-9D3hJLuj", "defects": [ "CSCvz27235" ], "discovery": "EXTERNAL" }, "title": "Multiple Cisco Products Snort Modbus Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20685", "datePublished": "2024-11-15T15:36:31.261Z", "dateReserved": "2021-11-02T13:28:29.055Z", "dateUpdated": "2025-01-27T17:48:32.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…