Lucene search

K
cve[email protected]CVE-2022-20938
HistoryNov 15, 2022 - 9:15 p.m.

CVE-2022-20938

2022-11-1521:15:34
CWE-611
web.nvd.nist.gov
46
5
cve-2022-20938
cisco
fmc
software
authentication bypass
vulnerability
security
nvd

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.4%

A vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view sensitive information.

This vulnerability is due to insufficient validation of the XML syntax when importing a module. An attacker could exploit this vulnerability by supplying a specially crafted XML file to the function. A successful exploit could allow the attacker to read sensitive data that would normally not be revealed.

Affected configurations

NVD
Node
ciscofirepower_management_centerMatch6.1.0
OR
ciscofirepower_management_centerMatch6.1.0.1
OR
ciscofirepower_management_centerMatch6.1.0.2
OR
ciscofirepower_management_centerMatch6.1.0.3
OR
ciscofirepower_management_centerMatch6.1.0.4
OR
ciscofirepower_management_centerMatch6.1.0.5
OR
ciscofirepower_management_centerMatch6.1.0.6
OR
ciscofirepower_management_centerMatch6.1.0.7
OR
ciscofirepower_management_centerMatch6.2.0
OR
ciscofirepower_management_centerMatch6.2.0.1
OR
ciscofirepower_management_centerMatch6.2.0.2
OR
ciscofirepower_management_centerMatch6.2.0.3
OR
ciscofirepower_management_centerMatch6.2.0.4
OR
ciscofirepower_management_centerMatch6.2.0.5
OR
ciscofirepower_management_centerMatch6.2.0.6
OR
ciscofirepower_management_centerMatch6.2.1
OR
ciscofirepower_management_centerMatch6.2.2
OR
ciscofirepower_management_centerMatch6.2.2.1
OR
ciscofirepower_management_centerMatch6.2.2.2
OR
ciscofirepower_management_centerMatch6.2.2.3
OR
ciscofirepower_management_centerMatch6.2.2.4
OR
ciscofirepower_management_centerMatch6.2.2.5
OR
ciscofirepower_management_centerMatch6.2.3
OR
ciscofirepower_management_centerMatch6.2.3.1
OR
ciscofirepower_management_centerMatch6.2.3.2
OR
ciscofirepower_management_centerMatch6.2.3.3
OR
ciscofirepower_management_centerMatch6.2.3.4
OR
ciscofirepower_management_centerMatch6.2.3.5
OR
ciscofirepower_management_centerMatch6.2.3.6
OR
ciscofirepower_management_centerMatch6.2.3.7
OR
ciscofirepower_management_centerMatch6.2.3.8
OR
ciscofirepower_management_centerMatch6.2.3.9
OR
ciscofirepower_management_centerMatch6.2.3.10
OR
ciscofirepower_management_centerMatch6.2.3.11
OR
ciscofirepower_management_centerMatch6.2.3.12
OR
ciscofirepower_management_centerMatch6.2.3.13
OR
ciscofirepower_management_centerMatch6.2.3.14
OR
ciscofirepower_management_centerMatch6.2.3.15
OR
ciscofirepower_management_centerMatch6.2.3.16
OR
ciscofirepower_management_centerMatch6.2.3.17
OR
ciscofirepower_management_centerMatch6.2.3.18
OR
ciscofirepower_management_centerMatch6.3.0
OR
ciscofirepower_management_centerMatch6.3.0.1
OR
ciscofirepower_management_centerMatch6.3.0.2
OR
ciscofirepower_management_centerMatch6.3.0.3
OR
ciscofirepower_management_centerMatch6.3.0.4
OR
ciscofirepower_management_centerMatch6.3.0.5
OR
ciscofirepower_management_centerMatch6.4.0
OR
ciscofirepower_management_centerMatch6.4.0.1
OR
ciscofirepower_management_centerMatch6.4.0.2
OR
ciscofirepower_management_centerMatch6.4.0.3
OR
ciscofirepower_management_centerMatch6.4.0.4
OR
ciscofirepower_management_centerMatch6.4.0.5
OR
ciscofirepower_management_centerMatch6.4.0.6
OR
ciscofirepower_management_centerMatch6.4.0.7
OR
ciscofirepower_management_centerMatch6.4.0.8
OR
ciscofirepower_management_centerMatch6.4.0.9
OR
ciscofirepower_management_centerMatch6.4.0.10
OR
ciscofirepower_management_centerMatch6.4.0.11
OR
ciscofirepower_management_centerMatch6.4.0.12
OR
ciscofirepower_management_centerMatch6.4.0.13
OR
ciscofirepower_management_centerMatch6.4.0.14
OR
ciscofirepower_management_centerMatch6.4.0.15
OR
ciscofirepower_management_centerMatch6.5.0
OR
ciscofirepower_management_centerMatch6.5.0.1
OR
ciscofirepower_management_centerMatch6.5.0.2
OR
ciscofirepower_management_centerMatch6.5.0.3
OR
ciscofirepower_management_centerMatch6.5.0.4
OR
ciscofirepower_management_centerMatch6.5.0.5
OR
ciscofirepower_management_centerMatch6.6.0
OR
ciscofirepower_management_centerMatch6.6.0.1
OR
ciscofirepower_management_centerMatch6.6.1
OR
ciscofirepower_management_centerMatch6.6.3
OR
ciscofirepower_management_centerMatch6.6.4
OR
ciscofirepower_management_centerMatch6.6.5
OR
ciscofirepower_management_centerMatch6.6.5.1
OR
ciscofirepower_management_centerMatch6.6.5.2
OR
ciscofirepower_management_centerMatch6.7.0
OR
ciscofirepower_management_centerMatch6.7.0.1
OR
ciscofirepower_management_centerMatch6.7.0.2
OR
ciscofirepower_management_centerMatch6.7.0.3
OR
ciscofirepower_management_centerMatch7.0.0
OR
ciscofirepower_management_centerMatch7.0.0.1
OR
ciscofirepower_management_centerMatch7.0.1
OR
ciscofirepower_management_centerMatch7.0.1.1
OR
ciscofirepower_management_centerMatch7.0.2
OR
ciscofirepower_management_centerMatch7.0.2.1
OR
ciscofirepower_management_centerMatch7.0.3
OR
ciscofirepower_management_centerMatch7.0.4
OR
ciscofirepower_management_centerMatch7.1.0
OR
ciscofirepower_management_centerMatch7.1.0.1
OR
ciscofirepower_management_centerMatch7.1.0.2

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Firepower Management Center",
    "versions": [
      {
        "version": "6.2.3",
        "status": "affected"
      },
      {
        "version": "6.2.3.1",
        "status": "affected"
      },
      {
        "version": "6.2.3.2",
        "status": "affected"
      },
      {
        "version": "6.2.3.3",
        "status": "affected"
      },
      {
        "version": "6.2.3.4",
        "status": "affected"
      },
      {
        "version": "6.2.3.5",
        "status": "affected"
      },
      {
        "version": "6.2.3.6",
        "status": "affected"
      },
      {
        "version": "6.2.3.7",
        "status": "affected"
      },
      {
        "version": "6.2.3.9",
        "status": "affected"
      },
      {
        "version": "6.2.3.10",
        "status": "affected"
      },
      {
        "version": "6.2.3.11",
        "status": "affected"
      },
      {
        "version": "6.2.3.12",
        "status": "affected"
      },
      {
        "version": "6.2.3.13",
        "status": "affected"
      },
      {
        "version": "6.2.3.14",
        "status": "affected"
      },
      {
        "version": "6.2.3.15",
        "status": "affected"
      },
      {
        "version": "6.2.3.8",
        "status": "affected"
      },
      {
        "version": "6.2.3.16",
        "status": "affected"
      },
      {
        "version": "6.2.3.17",
        "status": "affected"
      },
      {
        "version": "6.2.3.18",
        "status": "affected"
      },
      {
        "version": "6.4.0",
        "status": "affected"
      },
      {
        "version": "6.4.0.1",
        "status": "affected"
      },
      {
        "version": "6.4.0.3",
        "status": "affected"
      },
      {
        "version": "6.4.0.2",
        "status": "affected"
      },
      {
        "version": "6.4.0.4",
        "status": "affected"
      },
      {
        "version": "6.4.0.5",
        "status": "affected"
      },
      {
        "version": "6.4.0.6",
        "status": "affected"
      },
      {
        "version": "6.4.0.7",
        "status": "affected"
      },
      {
        "version": "6.4.0.8",
        "status": "affected"
      },
      {
        "version": "6.4.0.9",
        "status": "affected"
      },
      {
        "version": "6.4.0.10",
        "status": "affected"
      },
      {
        "version": "6.4.0.11",
        "status": "affected"
      },
      {
        "version": "6.4.0.12",
        "status": "affected"
      },
      {
        "version": "6.4.0.13",
        "status": "affected"
      },
      {
        "version": "6.4.0.14",
        "status": "affected"
      },
      {
        "version": "6.4.0.15",
        "status": "affected"
      },
      {
        "version": "6.6.0",
        "status": "affected"
      },
      {
        "version": "6.6.0.1",
        "status": "affected"
      },
      {
        "version": "6.6.1",
        "status": "affected"
      },
      {
        "version": "6.6.3",
        "status": "affected"
      },
      {
        "version": "6.6.4",
        "status": "affected"
      },
      {
        "version": "6.6.5",
        "status": "affected"
      },
      {
        "version": "6.6.5.1",
        "status": "affected"
      },
      {
        "version": "6.6.5.2",
        "status": "affected"
      },
      {
        "version": "6.7.0",
        "status": "affected"
      },
      {
        "version": "6.7.0.1",
        "status": "affected"
      },
      {
        "version": "6.7.0.2",
        "status": "affected"
      },
      {
        "version": "6.7.0.3",
        "status": "affected"
      },
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "version": "7.0.0.1",
        "status": "affected"
      },
      {
        "version": "7.0.1",
        "status": "affected"
      },
      {
        "version": "7.0.1.1",
        "status": "affected"
      },
      {
        "version": "7.0.2",
        "status": "affected"
      },
      {
        "version": "7.0.2.1",
        "status": "affected"
      },
      {
        "version": "7.0.3",
        "status": "affected"
      },
      {
        "version": "7.0.4",
        "status": "affected"
      },
      {
        "version": "7.1.0",
        "status": "affected"
      },
      {
        "version": "7.1.0.1",
        "status": "affected"
      },
      {
        "version": "7.1.0.2",
        "status": "affected"
      }
    ]
  }
]

Social References

More

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.4%

Related for CVE-2022-20938