6.7

CVE-2022-20865

A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The attacker would need to have Administrator privileges on the device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoFirepower 4110 Firmware Version-
   CiscoFirepower 4110 Version-
CiscoFirepower 4112 Firmware Version-
   CiscoFirepower 4112 Version-
CiscoFirepower 4115 Firmware Version-
   CiscoFirepower 4115 Version-
CiscoFirepower 4120 Firmware Version-
   CiscoFirepower 4120 Version-
CiscoFirepower 4125 Firmware Version-
   CiscoFirepower 4125 Version-
CiscoFirepower 4140 Firmware Version-
   CiscoFirepower 4140 Version-
CiscoFirepower 4145 Firmware Version-
   CiscoFirepower 4145 Version-
CiscoFirepower 4150 Firmware Version-
   CiscoFirepower 4150 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.22% 0.443
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
psirt@cisco.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.