7.2

CVE-2022-20677

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

Data is provided by the National Vulnerability Database (NVD)
CiscoIos Version17.6.1
   Cisco1100-4g Integrated Services Router Version-
   Cisco1100-6g Integrated Services Router Version-
   Cisco1101 Integrated Services Router Version-
   Cisco1109 Integrated Services Router Version-
   Cisco1111x Integrated Services Router Version-
   Cisco111x Integrated Services Router Version-
   Cisco1120 Integrated Services Router Version-
   Cisco1131 Integrated Services Router Version-
   Cisco1160 Integrated Services Router Version-
   Cisco4221 Integrated Services Router Version-
   Cisco8101-32fh Version-
   Cisco8101-32h Version-
   Cisco8102-64h Version-
   Cisco8201 Version-
   Cisco8201-32fh Version-
   Cisco8202 Version-
   Cisco8800 Version-
   CiscoAsr 1001-x Version-
   CiscoAsr 1002-hx Version-
   CiscoAsr 1006-x Version-
   CiscoAsr 1009-x Version-
   CiscoAsr 900 Version-
   CiscoAsr 9000v-v2 Version-
   CiscoAsr 9001 Version-
   CiscoAsr 9006 Version-
   CiscoAsr 9010 Version-
   CiscoAsr 9901 Version-
   CiscoAsr 9902 Version-
   CiscoAsr 9903 Version-
   CiscoAsr 9904 Version-
   CiscoAsr 9906 Version-
   CiscoAsr 9910 Version-
   CiscoAsr 9912 Version-
   CiscoAsr 9922 Version-
   CiscoCatalyst 3650 Version-
   CiscoCatalyst 3850 Version-
   CiscoCatalyst 8200 Version-
   CiscoCatalyst 8300 Version-
   CiscoCatalyst 8500 Version-
   CiscoCatalyst 8500l Version-
   CiscoCatalyst 9200 Version-
   CiscoCatalyst 9300 Version-
   CiscoCatalyst 9400 Version-
   CiscoCatalyst 9500 Version-
   CiscoCatalyst 9500h Version-
   CiscoCatalyst 9600 Version-
   CiscoCatalyst 9800 Version-
   CiscoCatalyst 9800-40 Version-
   CiscoCatalyst 9800-80 Version-
   CiscoCatalyst 9800-cl Version-
   CiscoCatalyst 9800-l Version-
   CiscoCatalyst Cg418-e Version-
   CiscoCatalyst Cg522-e Version-
   CiscoCatalyst Ess9300 Version-
   CiscoCatalyst Ie3200 Version-
   CiscoCatalyst Ie3300 Version-
   CiscoCatalyst Ie3400 Version-
   CiscoCatalyst Ie9300 Version-
   CiscoCloud Services Router 1000v Version-
   CiscoEsr3300 Version-
   CiscoEsr6300 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.16% 0.375
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
psirt@cisco.com 5.5 1.2 4.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CWE-326 Inadequate Encryption Strength

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.