Lucene search

K
cve[email protected]CVE-2022-20726
HistoryApr 15, 2022 - 3:15 p.m.

CVE-2022-20726

2022-04-1515:15:13
CWE-755
CWE-22
web.nvd.nist.gov
55
cisco
iox
application hosting
vulnerability
cisco platforms
arbitrary commands
code execution
authentication
cross-site scripting
xss
nvd
cve-2022-20726

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

Affected configurations

NVD
Node
ciscocgr1000_compute_module
OR
ciscoic3000_industrial_compute_gateway
OR
ciscoios
OR
ciscoiosMatch15.2\(5\)e1
OR
ciscoiosMatch15.2\(5\)e2c
OR
ciscoiosMatch15.2\(6\)e0a
OR
ciscoiosMatch15.2\(6\)e1
OR
ciscoiosMatch15.2\(6\)e2a
OR
ciscoiosMatch15.2\(7\)e
OR
ciscoiosMatch15.2\(7\)e0b
OR
ciscoiosMatch15.2\(7\)e0s
OR
ciscoiosMatch15.6\(1\)t1
OR
ciscoiosMatch15.6\(1\)t2
OR
ciscoiosMatch15.6\(1\)t3
OR
ciscoiosMatch15.6\(2\)t
OR
ciscoiosMatch15.6\(2\)t1
OR
ciscoiosMatch15.6\(2\)t2
OR
ciscoiosMatch15.6\(2\)t3
OR
ciscoiosMatch15.6\(3\)m
OR
ciscoiosMatch15.6\(3\)m0a
OR
ciscoiosMatch15.6\(3\)m1
OR
ciscoiosMatch15.6\(3\)m1b
OR
ciscoiosMatch15.6\(3\)m2
OR
ciscoiosMatch15.6\(3\)m3
OR
ciscoiosMatch15.6\(3\)m3a
OR
ciscoiosMatch15.6\(3\)m4
OR
ciscoiosMatch15.6\(3\)m5
OR
ciscoiosMatch15.6\(3\)m6
OR
ciscoiosMatch15.6\(3\)m6a
OR
ciscoiosMatch15.6\(3\)m6b
OR
ciscoiosMatch15.6\(3\)m7
OR
ciscoiosMatch15.6\(3\)m8
OR
ciscoiosMatch15.7\(3\)m
OR
ciscoiosMatch15.7\(3\)m0a
OR
ciscoiosMatch15.7\(3\)m1
OR
ciscoiosMatch15.7\(3\)m2
OR
ciscoiosMatch15.7\(3\)m3
OR
ciscoiosMatch15.7\(3\)m4
OR
ciscoiosMatch15.7\(3\)m4a
OR
ciscoiosMatch15.7\(3\)m4b
OR
ciscoiosMatch15.7\(3\)m5
OR
ciscoiosMatch15.7\(3\)m6
OR
ciscoiosMatch15.8\(3\)m
OR
ciscoiosMatch15.8\(3\)m0a
OR
ciscoiosMatch15.8\(3\)m1
OR
ciscoiosMatch15.8\(3\)m2
OR
ciscoiosMatch15.8\(3\)m2a
OR
ciscoiosMatch15.8\(3\)m3
OR
ciscoiosMatch15.8\(3\)m4
OR
ciscoiosMatch15.8\(3\)m5
OR
ciscoiosMatch15.8\(3\)m6
OR
ciscoiosMatch15.8\(3\)m7
OR
ciscoiosMatch15.9\(3\)m
OR
ciscoiosMatch15.9\(3\)m1
OR
ciscoiosMatch15.9\(3\)m2
OR
ciscoiosMatch15.9\(3\)m2a
OR
ciscoiosMatch15.9\(3\)m3
OR
ciscoiosMatch15.9\(3\)m4
OR
ciscoiosMatch15.9\(3\)m4a

CNA Affected

[
  {
    "product": "Cisco IOS ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%

Related for CVE-2022-20726