Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-20818— Cisco SD-WAN Software Privilege Escalation Vulnerabilities

CVSS 7.8 · High EPSS 0.52% · P67
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-20818

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco SD-WAN Software Privilege Escalation Vulnerabilities
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
路径遍历:’/../filedir’
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco SD-WAN 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco SD-WAN是美国思科(Cisco)公司的一种高度安全的云规模架构,具有开放性、可编程性和可扩展性。 Cisco SD-WAN Software存在路径遍历漏洞,该漏洞源于对应用程序CLI中的命令的访问控制不当,可能允许经过身份验证的本地攻击者获得提升的权限,成功利用此漏洞可以让攻击者执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco SD-WAN Solution n/a -

II. Public POCs for CVE-2022-20818

#POC DescriptionSource LinkShenlong Link
1CVE-2022-20818: Local Privilege Escalation via Partial File Read in Cisco SD-WANhttps://github.com/mbadanoiu/CVE-2022-20818POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-20818

登录查看更多情报信息。

Same Patch Batch · Cisco · 2022-09-30 · 16 CVEs total

CVE-2022-209198.6 HIGHCisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnera
CVE-2022-208568.6 HIGHCisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Den
CVE-2022-208488.6 HIGHCisco IOS XE Software for Embedded Wireless Controllers on Catalyst 9100 Series Access Poi
CVE-2022-208478.6 HIGHCisco IOS XE Wireless Controller Software for the Catalyst 9000 Family DHCP Processing Den
CVE-2022-208557.9 HIGHCisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privileg
CVE-2022-207757.8 HIGHCisco SD-WAN Software Privilege Escalation Vulnerability
CVE-2022-209457.4 HIGHCisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerabili
CVE-2022-207697.4 HIGHCisco Wireless LAN Controller AireOS Software FIPS Mode Denial of Service Vulnerability
CVE-2022-209306.7 MEDIUMCisco SD-WAN Software Arbitrary File Corruption Vulnerability
CVE-2022-208106.5 MEDIUMCisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Di
CVE-2022-206626.1 MEDIUMCisco Duo for macOS Authentication Bypass Vulnerability
CVE-2022-208515.5 MEDIUMCisco IOS XE Software Web UI Command Injection Vulnerability
CVE-2022-208505.5 MEDIUMCisco SD-WAN Arbitrary File Deletion Vulnerability
CVE-2022-208445.3 MEDIUMCisco Software-Defined Application Visibility and Control on Cisco vManage Static Username
CVE-2022-207284.7 MEDIUMCisco Access Points VLAN Bypass from Native VLAN Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2022-20818

No comments yet


Leave a comment