ID

VAR-202204-0246


CVE

CVE-2022-20661


TITLE

Cisco Catalyst Digital Building  series switch   and  Cisco Catalyst  Initialization Vulnerability in Microswitch

Trust: 0.8

sources: JVNDB: JVNDB-2022-009565

DESCRIPTION

Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory

Trust: 2.25

sources: NVD: CVE-2022-20661 // JVNDB: JVNDB-2022-009565 // CNVD: CNVD-2022-46479 // VULMON: CVE-2022-20661

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-46479

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:gteversion:15.2\(5\)ex

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(8\)e

Trust: 1.0

vendor:ciscomodel:iosscope:ltversion:15.2\(7\)e5

Trust: 1.0

vendor:シスコシステムズmodel:cisco iosscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco iosscope: - version: -

Trust: 0.8

vendor:ciscomodel:catalyst digital building series switches 15.2 exscope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst digital building series switches <=15.2 escope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst micro switches <=15.2 escope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst micro switches 15.2 escope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2022-46479 // JVNDB: JVNDB-2022-009565 // NVD: CVE-2022-20661

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-20661
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2022-20661
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-20661
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2022-46479
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202204-3460
value: MEDIUM

Trust: 0.6

VULMON: CVE-2022-20661
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-20661
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-46479
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-20661
baseSeverity: MEDIUM
baseScore: 4.6
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-20661
baseSeverity: MEDIUM
baseScore: 4.6
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-46479 // VULMON: CVE-2022-20661 // JVNDB: JVNDB-2022-009565 // CNNVD: CNNVD-202204-3460 // NVD: CVE-2022-20661 // NVD: CVE-2022-20661

PROBLEMTYPE DATA

problemtype:CWE-1221

Trust: 1.0

problemtype:CWE-665

Trust: 1.0

problemtype:Improper initialization (CWE-665) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-009565 // NVD: CVE-2022-20661

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202204-3460

PATCH

title:cisco-sa-cdb-cmicr-vulns-KJjFtNburl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdb-cmicr-vulns-KJjFtNb

Trust: 0.8

title:Patch for Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches Denial of Service Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/336696

Trust: 0.6

title:Cisco Catalyst Digital Building Series Switches Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189517

Trust: 0.6

title:Cisco: Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-cdb-cmicr-vulns-KJjFtNb

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: CNVD: CNVD-2022-46479 // VULMON: CVE-2022-20661 // JVNDB: JVNDB-2022-009565 // CNNVD: CNNVD-202204-3460

EXTERNAL IDS

db:NVDid:CVE-2022-20661

Trust: 3.9

db:JVNDBid:JVNDB-2022-009565

Trust: 0.8

db:CNVDid:CNVD-2022-46479

Trust: 0.6

db:CS-HELPid:SB2022041512

Trust: 0.6

db:CNNVDid:CNNVD-202204-3460

Trust: 0.6

db:VULMONid:CVE-2022-20661

Trust: 0.1

sources: CNVD: CNVD-2022-46479 // VULMON: CVE-2022-20661 // JVNDB: JVNDB-2022-009565 // CNNVD: CNNVD-202204-3460 // NVD: CVE-2022-20661

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-cdb-cmicr-vulns-kjjftnb

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-20661

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-20661/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022041512

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/665.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: CNVD: CNVD-2022-46479 // VULMON: CVE-2022-20661 // JVNDB: JVNDB-2022-009565 // CNNVD: CNNVD-202204-3460 // NVD: CVE-2022-20661

SOURCES

db:CNVDid:CNVD-2022-46479
db:VULMONid:CVE-2022-20661
db:JVNDBid:JVNDB-2022-009565
db:CNNVDid:CNNVD-202204-3460
db:NVDid:CVE-2022-20661

LAST UPDATE DATE

2024-11-23T21:50:38.163000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-46479date:2022-06-21T00:00:00
db:VULMONid:CVE-2022-20661date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2022-009565date:2023-08-07T07:33:00
db:CNNVDid:CNNVD-202204-3460date:2022-04-26T00:00:00
db:NVDid:CVE-2022-20661date:2024-11-21T06:43:15.880

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-46479date:2022-06-21T00:00:00
db:VULMONid:CVE-2022-20661date:2022-04-15T00:00:00
db:JVNDBid:JVNDB-2022-009565date:2023-08-07T00:00:00
db:CNNVDid:CNNVD-202204-3460date:2022-04-15T00:00:00
db:NVDid:CVE-2022-20661date:2022-04-15T15:15:12.300