ID

VAR-202206-1254


CVE

CVE-2022-20798


TITLE

Cisco Secure Email and Web Manager  and  Cisco Email Security Appliance  Authentication vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011606

DESCRIPTION

A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-20798 // JVNDB: JVNDB-2022-011606 // VULHUB: VHN-405351 // VULMON: CVE-2022-20798

AFFECTED PRODUCTS

vendor:ciscomodel:email security appliancescope:eqversion:7.1.5

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:gteversion:13.0

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:ltversion:13.0.0-277

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:gteversion:13.8

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:ltversion:13.8.1-090

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:ltversion:14.0.0-418

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:gteversion:14.1

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:gteversion:13.6

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:ltversion:13.6.2-090

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:ltversion:14.1.0-250

Trust: 1.0

vendor:ciscomodel:email security appliancescope:gteversion:14.0

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:gteversion:14.0

Trust: 1.0

vendor:ciscomodel:email security appliancescope:ltversion:14.0.1-033

Trust: 1.0

vendor:シスコシステムズmodel:cisco email security appliancescope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco secure email and web managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-011606 // NVD: CVE-2022-20798

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-20798
value: CRITICAL

Trust: 1.8

ykramarz@cisco.com: CVE-2022-20798
value: CRITICAL

Trust: 1.0

CNNVD: CNNVD-202206-1535
value: CRITICAL

Trust: 0.6

VULHUB: VHN-405351
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-20798
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2022-20798
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

VULHUB: VHN-405351
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-20798
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-405351 // VULMON: CVE-2022-20798 // JVNDB: JVNDB-2022-011606 // CNNVD: CNNVD-202206-1535 // NVD: CVE-2022-20798 // NVD: CVE-2022-20798

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.1

problemtype:Inappropriate authentication (CWE-287) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-405351 // JVNDB: JVNDB-2022-011606 // NVD: CVE-2022-20798

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202206-1535

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202206-1535

CONFIGURATIONS

sources: NVD: CVE-2022-20798

PATCH

title:cisco-sa-sma-esa-auth-bypass-66kEcxQDurl:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sma-esa-auth-bypass-66kecxqd

Trust: 0.8

title:Cisco Multiple products Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198123

Trust: 0.6

title:Cisco: Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-sma-esa-auth-bypass-66kecxqd

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/alphabugx/cve-2022-rce

Trust: 0.1

sources: VULMON: CVE-2022-20798 // JVNDB: JVNDB-2022-011606 // CNNVD: CNNVD-202206-1535

EXTERNAL IDS

db:NVDid:CVE-2022-20798

Trust: 3.4

db:JVNDBid:JVNDB-2022-011606

Trust: 0.8

db:CNNVDid:CNNVD-202206-1535

Trust: 0.7

db:AUSCERTid:ESB-2022.2965

Trust: 0.6

db:CNVDid:CNVD-2022-55685

Trust: 0.1

db:VULHUBid:VHN-405351

Trust: 0.1

db:VULMONid:CVE-2022-20798

Trust: 0.1

sources: VULHUB: VHN-405351 // VULMON: CVE-2022-20798 // JVNDB: JVNDB-2022-011606 // CNNVD: CNNVD-202206-1535 // NVD: CVE-2022-20798

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sma-esa-auth-bypass-66kecxqd

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-20798

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2022.2965

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-esa-secure-email-and-web-manager-privilege-escalation-via-ldap-external-authentication-38604

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-20798/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: VULHUB: VHN-405351 // VULMON: CVE-2022-20798 // JVNDB: JVNDB-2022-011606 // CNNVD: CNNVD-202206-1535 // NVD: CVE-2022-20798

SOURCES

db:VULHUBid:VHN-405351
db:VULMONid:CVE-2022-20798
db:JVNDBid:JVNDB-2022-011606
db:CNNVDid:CNNVD-202206-1535
db:NVDid:CVE-2022-20798

LAST UPDATE DATE

2024-02-13T02:02:06.444000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-405351date:2022-06-27T00:00:00
db:VULMONid:CVE-2022-20798date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2022-011606date:2023-08-23T05:10:00
db:CNNVDid:CNNVD-202206-1535date:2022-06-30T00:00:00
db:NVDid:CVE-2022-20798date:2023-11-07T03:42:58.890

SOURCES RELEASE DATE

db:VULHUBid:VHN-405351date:2022-06-15T00:00:00
db:VULMONid:CVE-2022-20798date:2022-06-15T00:00:00
db:JVNDBid:JVNDB-2022-011606date:2023-08-23T00:00:00
db:CNNVDid:CNNVD-202206-1535date:2022-06-15T00:00:00
db:NVDid:CVE-2022-20798date:2022-06-15T18:15:08.927