cve-2022-20633
Vulnerability from cvelistv5
Published
2024-11-15 16:15
Modified
2024-11-15 21:35
Summary
A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device. This vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Version: 11.6(1)_ES3
Version: 11.6(1)_ES4
Version: 12.0(1)_ES6
Version: 11.6(1)_ES8
Version: 12.0(1)_ES5a
Version: 11.6(1)_ES9
Version: 12.0(1)_ES6_ET1
Version: 11.6(1)_ES6
Version: 11.6(1)_ES5
Version: 12.5(1)_ET1
Version: 12.5(1)
Version: 12.5(1)_ES3_ET1
Version: 12.0(1)_ES3
Version: 11.6(1)_ES11
Version: 12.0(1)_ES4
Version: 12.0(1)_ES5
Version: 11.6(1)_ES2
Version: 11.6(1)_ES9a
Version: 11.6(1)_ES10
Version: 12.0(1)_ES1
Version: 12.0(1)
Version: 12.5(1)_ES3
Version: 12.6(1)
Version: 11.5(1)
Version: 12.0(1)_ES2
Version: 11.6(1)_ES7
Version: 12.5(1)_ES2
Version: 12.6(1)_ET1
Version: 11.6(1)
Version: 12.5(1)_ES1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "enterprise_chat_and_email",
                  vendor: "cisco",
                  versions: [
                     {
                        lessThan: "12.6(1)_ES1",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-20633",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-15T18:00:16.076880Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-15T21:35:35.232Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Cisco Enterprise Chat and Email",
               vendor: "Cisco",
               versions: [
                  {
                     status: "affected",
                     version: "11.6(1)_ES3",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES4",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)_ES6",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES8",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)_ES5a",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES9",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)_ES6_ET1",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES6",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES5",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)_ET1",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)_ES3_ET1",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)_ES3",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES11",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)_ES4",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)_ES5",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES2",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES9a",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES10",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)_ES1",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)_ES3",
                  },
                  {
                     status: "affected",
                     version: "12.6(1)",
                  },
                  {
                     status: "affected",
                     version: "11.5(1)",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)_ES2",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)_ES7",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)_ES2",
                  },
                  {
                     status: "affected",
                     version: "12.6(1)_ET1",
                  },
                  {
                     status: "affected",
                     version: "11.6(1)",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)_ES1",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device.\r\n\r\nThis vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "cvssV3_1",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-204",
                     description: "Observable Response Discrepancy",
                     lang: "en",
                     type: "cwe",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-11-15T16:15:01.284Z",
            orgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
            shortName: "cisco",
         },
         references: [
            {
               name: "cisco-sa-ece-multivulns-kbK2yVhR",
               url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
            },
         ],
         source: {
            advisory: "cisco-sa-ece-multivulns-kbK2yVhR",
            defects: [
               "CSCvz20450",
            ],
            discovery: "INTERNAL",
         },
         title: "Cisco Enterprise Chat and Email Username Enumeration Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
      assignerShortName: "cisco",
      cveId: "CVE-2022-20633",
      datePublished: "2024-11-15T16:15:01.284Z",
      dateReserved: "2021-11-02T13:28:29.030Z",
      dateUpdated: "2024-11-15T21:35:35.232Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2022-20633\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-11-15T17:15:10.820\",\"lastModified\":\"2024-11-18T17:11:56.587\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device.\\r\\n\\r\\nThis vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks.\\r\\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la interfaz de administración basada en web de Cisco ECE podría permitir que un atacante remoto no autenticado realice un ataque de enumeración de nombres de usuario contra un dispositivo afectado. Esta vulnerabilidad se debe a diferencias en las respuestas de autenticación que se envían desde la aplicación como parte de un intento de autenticación. Un atacante podría aprovechar esta vulnerabilidad enviando solicitudes de autenticación a un dispositivo afectado. Una explotación exitosa podría permitir al atacante confirmar cuentas de usuario existentes, que podrían usarse en ataques posteriores. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-204\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR\",\"source\":\"ykramarz@cisco.com\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-20633\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-15T18:00:16.076880Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"enterprise_chat_and_email\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"12.6(1)_ES1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-15T21:35:30.267Z\"}}], \"cna\": {\"title\": \"Cisco Enterprise Chat and Email Username Enumeration Vulnerability\", \"source\": {\"defects\": [\"CSCvz20450\"], \"advisory\": \"cisco-sa-ece-multivulns-kbK2yVhR\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Enterprise Chat and Email\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.6(1)_ES3\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES4\"}, {\"status\": \"affected\", \"version\": \"12.0(1)_ES6\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES8\"}, {\"status\": \"affected\", \"version\": \"12.0(1)_ES5a\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES9\"}, {\"status\": \"affected\", \"version\": \"12.0(1)_ES6_ET1\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES6\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES5\"}, {\"status\": \"affected\", \"version\": \"12.5(1)_ET1\"}, {\"status\": \"affected\", \"version\": \"12.5(1)\"}, {\"status\": \"affected\", \"version\": \"12.5(1)_ES3_ET1\"}, {\"status\": \"affected\", \"version\": \"12.0(1)_ES3\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES11\"}, {\"status\": \"affected\", \"version\": \"12.0(1)_ES4\"}, {\"status\": \"affected\", \"version\": \"12.0(1)_ES5\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES2\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES9a\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES10\"}, {\"status\": \"affected\", \"version\": \"12.0(1)_ES1\"}, {\"status\": \"affected\", \"version\": \"12.0(1)\"}, {\"status\": \"affected\", \"version\": \"12.5(1)_ES3\"}, {\"status\": \"affected\", \"version\": \"12.6(1)\"}, {\"status\": \"affected\", \"version\": \"11.5(1)\"}, {\"status\": \"affected\", \"version\": \"12.0(1)_ES2\"}, {\"status\": \"affected\", \"version\": \"11.6(1)_ES7\"}, {\"status\": \"affected\", \"version\": \"12.5(1)_ES2\"}, {\"status\": \"affected\", \"version\": \"12.6(1)_ET1\"}, {\"status\": \"affected\", \"version\": \"11.6(1)\"}, {\"status\": \"affected\", \"version\": \"12.5(1)_ES1\"}], \"defaultStatus\": \"unknown\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco\\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR\", \"name\": \"cisco-sa-ece-multivulns-kbK2yVhR\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device.\\r\\n\\r\\nThis vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks.\\r\\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-204\", \"description\": \"Observable Response Discrepancy\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-11-15T16:15:01.284Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2022-20633\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-15T21:35:35.232Z\", \"dateReserved\": \"2021-11-02T13:28:29.030Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-11-15T16:15:01.284Z\", \"assignerShortName\": \"cisco\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.