Lucene search

K
cve[email protected]CVE-2022-20855
HistorySep 30, 2022 - 7:15 p.m.

CVE-2022-20855

2022-09-3019:15:12
CWE-78
CWE-266
web.nvd.nist.gov
34
4
cve-2022-20855
cisco
ios xe software
vulnerability
security
nvd
access point

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

0.0004 Low

EPSS

Percentile

5.2%

A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.

Affected configurations

NVD
Node
ciscoios_xeMatch17.6.1
AND
ciscocatalyst_9105Match-
OR
ciscocatalyst_9105axiMatch-
OR
ciscocatalyst_9105axwMatch-
OR
ciscocatalyst_9115Match-
OR
ciscocatalyst_9115_apMatch-
OR
ciscocatalyst_9115axeMatch-
OR
ciscocatalyst_9115axiMatch-
OR
ciscocatalyst_9117Match-
OR
ciscocatalyst_9117_apMatch-
OR
ciscocatalyst_9117axiMatch-
OR
ciscocatalyst_9120Match-
OR
ciscocatalyst_9120_apMatch-
OR
ciscocatalyst_9120axeMatch-
OR
ciscocatalyst_9120axiMatch-
OR
ciscocatalyst_9120axpMatch-
OR
ciscocatalyst_9124Match-
OR
ciscocatalyst_9124axdMatch-
OR
ciscocatalyst_9124axiMatch-
OR
ciscocatalyst_9130Match-
OR
ciscocatalyst_9130_apMatch-
OR
ciscocatalyst_9130axeMatch-
OR
ciscocatalyst_9130axiMatch-
OR
ciscocatalyst_9800Match-
OR
ciscocatalyst_9800-40Match-
OR
ciscocatalyst_9800-80Match-
OR
ciscocatalyst_9800-clMatch-
OR
ciscocatalyst_9800-lMatch-
OR
ciscocatalyst_9800-l-cMatch-
OR
ciscocatalyst_9800-l-fMatch-
CPENameOperatorVersion
cisco:ios_xecisco ios xeeq17.6.1

CNA Affected

[
  {
    "product": "Cisco IOS XE Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

Social References

More

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

0.0004 Low

EPSS

Percentile

5.2%

Related for CVE-2022-20855