Lucene search

K
cve[email protected]CVE-2022-20834
HistoryNov 15, 2022 - 9:15 p.m.

CVE-2022-20834

2022-11-1521:15:24
CWE-79
web.nvd.nist.gov
38
4
cve-2022-20834
cisco
firepower management center
fmc
software
web-based management
interface
authenticated
remote attacker
stored cross-site scripting
xss
vulnerability
input validation
exploit
arbitrary script code
sensitive information
availability impact
nvd

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.3%

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.

These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.

Affected configurations

NVD
Node
ciscofirepower_management_centerMatch6.1.0
OR
ciscofirepower_management_centerMatch6.1.0.1
OR
ciscofirepower_management_centerMatch6.1.0.2
OR
ciscofirepower_management_centerMatch6.1.0.3
OR
ciscofirepower_management_centerMatch6.1.0.4
OR
ciscofirepower_management_centerMatch6.1.0.5
OR
ciscofirepower_management_centerMatch6.1.0.6
OR
ciscofirepower_management_centerMatch6.1.0.7
OR
ciscofirepower_management_centerMatch6.2.0
OR
ciscofirepower_management_centerMatch6.2.0.1
OR
ciscofirepower_management_centerMatch6.2.0.2
OR
ciscofirepower_management_centerMatch6.2.0.3
OR
ciscofirepower_management_centerMatch6.2.0.4
OR
ciscofirepower_management_centerMatch6.2.0.5
OR
ciscofirepower_management_centerMatch6.2.0.6
OR
ciscofirepower_management_centerMatch6.2.1
OR
ciscofirepower_management_centerMatch6.2.2
OR
ciscofirepower_management_centerMatch6.2.2.1
OR
ciscofirepower_management_centerMatch6.2.2.2
OR
ciscofirepower_management_centerMatch6.2.2.3
OR
ciscofirepower_management_centerMatch6.2.2.4
OR
ciscofirepower_management_centerMatch6.2.2.5
OR
ciscofirepower_management_centerMatch6.2.3
OR
ciscofirepower_management_centerMatch6.2.3.1
OR
ciscofirepower_management_centerMatch6.2.3.2
OR
ciscofirepower_management_centerMatch6.2.3.3
OR
ciscofirepower_management_centerMatch6.2.3.4
OR
ciscofirepower_management_centerMatch6.2.3.5
OR
ciscofirepower_management_centerMatch6.2.3.6
OR
ciscofirepower_management_centerMatch6.2.3.7
OR
ciscofirepower_management_centerMatch6.2.3.9
OR
ciscofirepower_management_centerMatch6.2.3.10
OR
ciscofirepower_management_centerMatch6.2.3.11
OR
ciscofirepower_management_centerMatch6.2.3.12
OR
ciscofirepower_management_centerMatch6.2.3.13
OR
ciscofirepower_management_centerMatch6.2.3.14
OR
ciscofirepower_management_centerMatch6.2.3.15
OR
ciscofirepower_management_centerMatch6.2.3.16
OR
ciscofirepower_management_centerMatch6.2.3.17
OR
ciscofirepower_management_centerMatch6.2.3.18
OR
ciscofirepower_management_centerMatch6.3.0
OR
ciscofirepower_management_centerMatch6.3.0.1
OR
ciscofirepower_management_centerMatch6.3.0.2
OR
ciscofirepower_management_centerMatch6.3.0.3
OR
ciscofirepower_management_centerMatch6.3.0.4
OR
ciscofirepower_management_centerMatch6.3.0.5
OR
ciscofirepower_management_centerMatch6.4.0
OR
ciscofirepower_management_centerMatch6.4.0.1
OR
ciscofirepower_management_centerMatch6.4.0.2
OR
ciscofirepower_management_centerMatch6.4.0.3
OR
ciscofirepower_management_centerMatch6.4.0.4
OR
ciscofirepower_management_centerMatch6.4.0.5
OR
ciscofirepower_management_centerMatch6.4.0.7
OR
ciscofirepower_management_centerMatch6.4.0.8
OR
ciscofirepower_management_centerMatch6.4.0.9
OR
ciscofirepower_management_centerMatch6.4.0.10
OR
ciscofirepower_management_centerMatch6.4.0.11
OR
ciscofirepower_management_centerMatch6.4.0.12
OR
ciscofirepower_management_centerMatch6.4.0.13
OR
ciscofirepower_management_centerMatch6.4.0.14
OR
ciscofirepower_management_centerMatch6.4.0.15
OR
ciscofirepower_management_centerMatch6.5.0
OR
ciscofirepower_management_centerMatch6.5.0.1
OR
ciscofirepower_management_centerMatch6.5.0.2
OR
ciscofirepower_management_centerMatch6.5.0.3
OR
ciscofirepower_management_centerMatch6.5.0.4
OR
ciscofirepower_management_centerMatch6.5.0.5
OR
ciscofirepower_management_centerMatch6.6.0
OR
ciscofirepower_management_centerMatch6.6.0.1
OR
ciscofirepower_management_centerMatch6.6.1
OR
ciscofirepower_management_centerMatch6.6.3
OR
ciscofirepower_management_centerMatch6.6.4
OR
ciscofirepower_management_centerMatch6.6.5
OR
ciscofirepower_management_centerMatch6.6.5.1
OR
ciscofirepower_management_centerMatch6.6.5.2
OR
ciscofirepower_management_centerMatch6.6.7
OR
ciscofirepower_management_centerMatch6.7.0
OR
ciscofirepower_management_centerMatch6.7.0.1
OR
ciscofirepower_management_centerMatch6.7.0.2
OR
ciscofirepower_management_centerMatch6.7.0.3
OR
ciscofirepower_management_centerMatch7.0.0
OR
ciscofirepower_management_centerMatch7.0.0.1
OR
ciscofirepower_management_centerMatch7.0.1
OR
ciscofirepower_management_centerMatch7.0.1.1
OR
ciscofirepower_management_centerMatch7.0.2
OR
ciscofirepower_management_centerMatch7.0.2.1
OR
ciscofirepower_management_centerMatch7.0.3
OR
ciscofirepower_management_centerMatch7.0.4
OR
ciscofirepower_management_centerMatch7.1.0
OR
ciscofirepower_management_centerMatch7.1.0.1
OR
ciscofirepower_management_centerMatch7.1.0.2
OR
ciscofirepower_management_centerMatch7.2.0

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Firepower Management Center",
    "versions": [
      {
        "version": "6.2.3",
        "status": "affected"
      },
      {
        "version": "6.2.3.1",
        "status": "affected"
      },
      {
        "version": "6.2.3.2",
        "status": "affected"
      },
      {
        "version": "6.2.3.3",
        "status": "affected"
      },
      {
        "version": "6.2.3.4",
        "status": "affected"
      },
      {
        "version": "6.2.3.5",
        "status": "affected"
      },
      {
        "version": "6.2.3.6",
        "status": "affected"
      },
      {
        "version": "6.2.3.7",
        "status": "affected"
      },
      {
        "version": "6.2.3.9",
        "status": "affected"
      },
      {
        "version": "6.2.3.10",
        "status": "affected"
      },
      {
        "version": "6.2.3.11",
        "status": "affected"
      },
      {
        "version": "6.2.3.12",
        "status": "affected"
      },
      {
        "version": "6.2.3.13",
        "status": "affected"
      },
      {
        "version": "6.2.3.14",
        "status": "affected"
      },
      {
        "version": "6.2.3.15",
        "status": "affected"
      },
      {
        "version": "6.2.3.8",
        "status": "affected"
      },
      {
        "version": "6.2.3.16",
        "status": "affected"
      },
      {
        "version": "6.2.3.17",
        "status": "affected"
      },
      {
        "version": "6.2.3.18",
        "status": "affected"
      },
      {
        "version": "6.4.0",
        "status": "affected"
      },
      {
        "version": "6.4.0.1",
        "status": "affected"
      },
      {
        "version": "6.4.0.3",
        "status": "affected"
      },
      {
        "version": "6.4.0.2",
        "status": "affected"
      },
      {
        "version": "6.4.0.4",
        "status": "affected"
      },
      {
        "version": "6.4.0.5",
        "status": "affected"
      },
      {
        "version": "6.4.0.6",
        "status": "affected"
      },
      {
        "version": "6.4.0.7",
        "status": "affected"
      },
      {
        "version": "6.4.0.8",
        "status": "affected"
      },
      {
        "version": "6.4.0.9",
        "status": "affected"
      },
      {
        "version": "6.4.0.10",
        "status": "affected"
      },
      {
        "version": "6.4.0.11",
        "status": "affected"
      },
      {
        "version": "6.4.0.12",
        "status": "affected"
      },
      {
        "version": "6.4.0.13",
        "status": "affected"
      },
      {
        "version": "6.4.0.14",
        "status": "affected"
      },
      {
        "version": "6.4.0.15",
        "status": "affected"
      },
      {
        "version": "6.6.0",
        "status": "affected"
      },
      {
        "version": "6.6.0.1",
        "status": "affected"
      },
      {
        "version": "6.6.1",
        "status": "affected"
      },
      {
        "version": "6.6.3",
        "status": "affected"
      },
      {
        "version": "6.6.4",
        "status": "affected"
      },
      {
        "version": "6.6.5",
        "status": "affected"
      },
      {
        "version": "6.6.5.1",
        "status": "affected"
      },
      {
        "version": "6.6.5.2",
        "status": "affected"
      },
      {
        "version": "6.7.0",
        "status": "affected"
      },
      {
        "version": "6.7.0.1",
        "status": "affected"
      },
      {
        "version": "6.7.0.2",
        "status": "affected"
      },
      {
        "version": "6.7.0.3",
        "status": "affected"
      },
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "version": "7.0.0.1",
        "status": "affected"
      },
      {
        "version": "7.0.1",
        "status": "affected"
      },
      {
        "version": "7.0.1.1",
        "status": "affected"
      },
      {
        "version": "7.0.2",
        "status": "affected"
      },
      {
        "version": "7.0.2.1",
        "status": "affected"
      },
      {
        "version": "7.0.3",
        "status": "affected"
      },
      {
        "version": "7.0.4",
        "status": "affected"
      },
      {
        "version": "7.1.0",
        "status": "affected"
      },
      {
        "version": "7.1.0.1",
        "status": "affected"
      },
      {
        "version": "7.1.0.2",
        "status": "affected"
      }
    ]
  }
]

Social References

More

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.3%

Related for CVE-2022-20834