ID

VAR-202210-1371


CVE

CVE-2022-20822


TITLE

Cisco Identity Services Engine Input validation error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202210-1457

DESCRIPTION

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read and delete files on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains certain character sequences to an affected system. A successful exploit could allow the attacker to read or delete specific files on the device that their configured administrative level should not have access to. Cisco plans to release software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM

Trust: 1.08

sources: NVD: CVE-2022-20822 // VULHUB: VHN-405375 // VULMON: CVE-2022-20822

AFFECTED PRODUCTS

vendor:ciscomodel:identity services enginescope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:3.2

Trust: 1.0

sources: NVD: CVE-2022-20822

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-20822
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2022-20822
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202210-1457
value: HIGH

Trust: 0.6

NVD:
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 5.2
version: 3.1

Trust: 1.0

ykramarz@cisco.com:
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 4.2
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202210-1457 // NVD: CVE-2022-20822 // NVD: CVE-2022-20822

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-405375 // NVD: CVE-2022-20822

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-1457

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202210-1457

CONFIGURATIONS

sources: NVD: CVE-2022-20822

PATCH

title:Cisco Identity Services Engine Enter the fix for the verification error vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqbyid.tag?id=212462

Trust: 0.6

title:Cisco: Cisco Identity Services Engine Unauthorized File Access Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-ise-path-trav-dz5dpzym

Trust: 0.1

sources: VULMON: CVE-2022-20822 // CNNVD: CNNVD-202210-1457

EXTERNAL IDS

db:NVDid:CVE-2022-20822

Trust: 1.8

db:CNNVDid:CNNVD-202210-1457

Trust: 0.6

db:VULHUBid:VHN-405375

Trust: 0.1

db:VULMONid:CVE-2022-20822

Trust: 0.1

sources: VULHUB: VHN-405375 // VULMON: CVE-2022-20822 // CNNVD: CNNVD-202210-1457 // NVD: CVE-2022-20822

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ise-path-trav-dz5dpzym

Trust: 2.4

url:https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/

Trust: 1.0

url:https://cxsecurity.com/cveshow/cve-2022-20822/

Trust: 0.6

sources: VULHUB: VHN-405375 // VULMON: CVE-2022-20822 // CNNVD: CNNVD-202210-1457 // NVD: CVE-2022-20822

SOURCES

db:VULHUBid:VHN-405375
db:VULMONid:CVE-2022-20822
db:CNNVDid:CNNVD-202210-1457
db:NVDid:CVE-2022-20822

LAST UPDATE DATE

2024-01-17T20:38:43.033000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-405375date:2022-10-31T00:00:00
db:CNNVDid:CNNVD-202210-1457date:2022-11-01T00:00:00
db:NVDid:CVE-2022-20822date:2024-01-16T22:15:36.307

SOURCES RELEASE DATE

db:VULHUBid:VHN-405375date:2022-10-26T00:00:00
db:CNNVDid:CNNVD-202210-1457date:2022-10-19T00:00:00
db:NVDid:CVE-2022-20822date:2022-10-26T15:15:14.607