ID

VAR-202206-1349


CVE

CVE-2022-20664


TITLE

Cisco Secure Email and Web Manager  and  Cisco Email Security Appliance  Vulnerability regarding information leakage in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011609

DESCRIPTION

A vulnerability in the web management interface of Cisco Secure Email and Web Manager, formerly Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an authenticated, remote attacker to retrieve sensitive information from a Lightweight Directory Access Protocol (LDAP) external authentication server connected to an affected device. This vulnerability is due to a lack of proper input sanitization while querying the external authentication server. An attacker could exploit this vulnerability by sending a crafted query through an external authentication web page. A successful exploit could allow the attacker to gain access to sensitive information, including user credentials from the external authentication server. To exploit this vulnerability, an attacker would need valid operator-level (or higher) credentials

Trust: 1.8

sources: NVD: CVE-2022-20664 // JVNDB: JVNDB-2022-011609 // VULHUB: VHN-405217 // VULMON: CVE-2022-20664

AFFECTED PRODUCTS

vendor:ciscomodel:secure email and web managerscope:ltversion:13.6.2-090

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:ltversion:14.1.0-227

Trust: 1.0

vendor:ciscomodel:email security appliancescope:ltversion:14.0.2-020

Trust: 1.0

vendor:ciscomodel:secure email and web managerscope:gteversion:14.1

Trust: 1.0

vendor:シスコシステムズmodel:cisco email security appliancescope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco secure email and web managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-011609 // NVD: CVE-2022-20664

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-20664
value: HIGH

Trust: 1.8

ykramarz@cisco.com: CVE-2022-20664
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202206-1538
value: HIGH

Trust: 0.6

VULHUB: VHN-405217
value: LOW

Trust: 0.1

VULMON: CVE-2022-20664
value: LOW

Trust: 0.1

NVD:
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2022-20664
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

VULHUB: VHN-405217
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.1
impactScore: 4.0
version: 3.1

Trust: 2.0

NVD: CVE-2022-20664
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-405217 // VULMON: CVE-2022-20664 // JVNDB: JVNDB-2022-011609 // CNNVD: CNNVD-202206-1538 // NVD: CVE-2022-20664 // NVD: CVE-2022-20664

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

problemtype:information leak (CWE-200) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-405217 // JVNDB: JVNDB-2022-011609 // NVD: CVE-2022-20664

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202206-1538

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202206-1538

CONFIGURATIONS

sources: NVD: CVE-2022-20664

PATCH

title:cisco-sa-esasma-info-dsc-Q9tLuOvMurl:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esasma-info-dsc-q9tluovm

Trust: 0.8

title:Cisco Multiple products Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198125

Trust: 0.6

title:Cisco: Cisco Email Security Appliance and Cisco Secure Email and Web Manager Information Disclosure Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-esasma-info-dsc-q9tluovm

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/alphabugx/cve-2022-rce

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2022/06/22/cisco_bug_bundle/

Trust: 0.1

sources: VULMON: CVE-2022-20664 // JVNDB: JVNDB-2022-011609 // CNNVD: CNNVD-202206-1538

EXTERNAL IDS

db:NVDid:CVE-2022-20664

Trust: 3.4

db:JVNDBid:JVNDB-2022-011609

Trust: 0.8

db:CNNVDid:CNNVD-202206-1538

Trust: 0.7

db:AUSCERTid:ESB-2022.2968

Trust: 0.6

db:CNVDid:CNVD-2022-55669

Trust: 0.1

db:VULHUBid:VHN-405217

Trust: 0.1

db:VULMONid:CVE-2022-20664

Trust: 0.1

sources: VULHUB: VHN-405217 // VULMON: CVE-2022-20664 // JVNDB: JVNDB-2022-011609 // CNNVD: CNNVD-202206-1538 // NVD: CVE-2022-20664

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esasma-info-dsc-q9tluovm

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-20664

Trust: 0.8

url:https://vigilance.fr/vulnerability/cisco-esa-secure-email-and-web-manager-information-disclosure-via-ldap-38605

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2968

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-20664/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: VULHUB: VHN-405217 // VULMON: CVE-2022-20664 // JVNDB: JVNDB-2022-011609 // CNNVD: CNNVD-202206-1538 // NVD: CVE-2022-20664

SOURCES

db:VULHUBid:VHN-405217
db:VULMONid:CVE-2022-20664
db:JVNDBid:JVNDB-2022-011609
db:CNNVDid:CNNVD-202206-1538
db:NVDid:CVE-2022-20664

LAST UPDATE DATE

2024-02-13T01:55:47.455000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-405217date:2022-06-27T00:00:00
db:VULMONid:CVE-2022-20664date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2022-011609date:2023-08-23T05:21:00
db:CNNVDid:CNNVD-202206-1538date:2022-07-01T00:00:00
db:NVDid:CVE-2022-20664date:2023-11-07T03:42:33.617

SOURCES RELEASE DATE

db:VULHUBid:VHN-405217date:2022-06-15T00:00:00
db:VULMONid:CVE-2022-20664date:2022-06-15T00:00:00
db:JVNDBid:JVNDB-2022-011609date:2023-08-23T00:00:00
db:CNNVDid:CNNVD-202206-1538date:2022-06-15T00:00:00
db:NVDid:CVE-2022-20664date:2022-06-15T18:15:08.690