Lucene search

K
cve[email protected]CVE-2022-20941
HistoryNov 15, 2022 - 9:15 p.m.

CVE-2022-20941

2022-11-1521:15:34
CWE-331
CWE-334
CWE-862
web.nvd.nist.gov
39
4
cisco
fmc
software
web-based
management
interface
vulnerability
cve-2022-20941
nvd

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.9%

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to access sensitive information.

This vulnerability is due to missing authorization for certain resources in the web-based management interface together with insufficient entropy in these resource names. An attacker could exploit this vulnerability by sending a series of HTTPS requests to an affected device to enumerate resources on the device. A successful exploit could allow the attacker to retrieve sensitive information from the device.

Affected configurations

NVD
Node
ciscofirepower_management_centerMatch6.1.0
OR
ciscofirepower_management_centerMatch6.1.0.1
OR
ciscofirepower_management_centerMatch6.1.0.2
OR
ciscofirepower_management_centerMatch6.1.0.3
OR
ciscofirepower_management_centerMatch6.1.0.4
OR
ciscofirepower_management_centerMatch6.1.0.5
OR
ciscofirepower_management_centerMatch6.1.0.6
OR
ciscofirepower_management_centerMatch6.1.0.7
OR
ciscofirepower_management_centerMatch6.2.0
OR
ciscofirepower_management_centerMatch6.2.0.1
OR
ciscofirepower_management_centerMatch6.2.0.2
OR
ciscofirepower_management_centerMatch6.2.0.3
OR
ciscofirepower_management_centerMatch6.2.0.4
OR
ciscofirepower_management_centerMatch6.2.0.5
OR
ciscofirepower_management_centerMatch6.2.0.6
OR
ciscofirepower_management_centerMatch6.2.1
OR
ciscofirepower_management_centerMatch6.2.2
OR
ciscofirepower_management_centerMatch6.2.2.1
OR
ciscofirepower_management_centerMatch6.2.2.2
OR
ciscofirepower_management_centerMatch6.2.2.3
OR
ciscofirepower_management_centerMatch6.2.2.4
OR
ciscofirepower_management_centerMatch6.2.2.5
OR
ciscofirepower_management_centerMatch6.2.3
OR
ciscofirepower_management_centerMatch6.2.3.1
OR
ciscofirepower_management_centerMatch6.2.3.2
OR
ciscofirepower_management_centerMatch6.2.3.3
OR
ciscofirepower_management_centerMatch6.2.3.4
OR
ciscofirepower_management_centerMatch6.2.3.5
OR
ciscofirepower_management_centerMatch6.2.3.6
OR
ciscofirepower_management_centerMatch6.2.3.7
OR
ciscofirepower_management_centerMatch6.2.3.8
OR
ciscofirepower_management_centerMatch6.2.3.9
OR
ciscofirepower_management_centerMatch6.2.3.10
OR
ciscofirepower_management_centerMatch6.2.3.11
OR
ciscofirepower_management_centerMatch6.2.3.12
OR
ciscofirepower_management_centerMatch6.2.3.13
OR
ciscofirepower_management_centerMatch6.2.3.14
OR
ciscofirepower_management_centerMatch6.2.3.15
OR
ciscofirepower_management_centerMatch6.2.3.16
OR
ciscofirepower_management_centerMatch6.2.3.17
OR
ciscofirepower_management_centerMatch6.2.3.18
OR
ciscofirepower_management_centerMatch6.3.0
OR
ciscofirepower_management_centerMatch6.3.0.1
OR
ciscofirepower_management_centerMatch6.3.0.2
OR
ciscofirepower_management_centerMatch6.3.0.3
OR
ciscofirepower_management_centerMatch6.3.0.4
OR
ciscofirepower_management_centerMatch6.3.0.5
OR
ciscofirepower_management_centerMatch6.4.0
OR
ciscofirepower_management_centerMatch6.4.0.1
OR
ciscofirepower_management_centerMatch6.4.0.2
OR
ciscofirepower_management_centerMatch6.4.0.3
OR
ciscofirepower_management_centerMatch6.4.0.4
OR
ciscofirepower_management_centerMatch6.4.0.5
OR
ciscofirepower_management_centerMatch6.4.0.6
OR
ciscofirepower_management_centerMatch6.4.0.7
OR
ciscofirepower_management_centerMatch6.4.0.8
OR
ciscofirepower_management_centerMatch6.4.0.9
OR
ciscofirepower_management_centerMatch6.4.0.10
OR
ciscofirepower_management_centerMatch6.4.0.11
OR
ciscofirepower_management_centerMatch6.4.0.12
OR
ciscofirepower_management_centerMatch6.4.0.13
OR
ciscofirepower_management_centerMatch6.4.0.14
OR
ciscofirepower_management_centerMatch6.4.0.15
OR
ciscofirepower_management_centerMatch6.5.0
OR
ciscofirepower_management_centerMatch6.5.0.1
OR
ciscofirepower_management_centerMatch6.5.0.2
OR
ciscofirepower_management_centerMatch6.5.0.3
OR
ciscofirepower_management_centerMatch6.5.0.4
OR
ciscofirepower_management_centerMatch6.5.0.5
OR
ciscofirepower_management_centerMatch6.6.0
OR
ciscofirepower_management_centerMatch6.6.0.1
OR
ciscofirepower_management_centerMatch6.6.1
OR
ciscofirepower_management_centerMatch6.6.3
OR
ciscofirepower_management_centerMatch6.6.4
OR
ciscofirepower_management_centerMatch6.6.5
OR
ciscofirepower_management_centerMatch6.6.5.1
OR
ciscofirepower_management_centerMatch6.6.5.2
OR
ciscofirepower_management_centerMatch6.6.7
OR
ciscofirepower_management_centerMatch6.7.0
OR
ciscofirepower_management_centerMatch6.7.0.1
OR
ciscofirepower_management_centerMatch6.7.0.2
OR
ciscofirepower_management_centerMatch6.7.0.3
OR
ciscofirepower_management_centerMatch7.0.0
OR
ciscofirepower_management_centerMatch7.0.0.1
OR
ciscofirepower_management_centerMatch7.0.1
OR
ciscofirepower_management_centerMatch7.0.1.1
OR
ciscofirepower_management_centerMatch7.0.2
OR
ciscofirepower_management_centerMatch7.0.2.1
OR
ciscofirepower_management_centerMatch7.0.3
OR
ciscofirepower_management_centerMatch7.0.4
OR
ciscofirepower_management_centerMatch7.1.0
OR
ciscofirepower_management_centerMatch7.1.0.1
OR
ciscofirepower_management_centerMatch7.1.0.2

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Firepower Management Center",
    "versions": [
      {
        "version": "6.2.3",
        "status": "affected"
      },
      {
        "version": "6.2.3.1",
        "status": "affected"
      },
      {
        "version": "6.2.3.2",
        "status": "affected"
      },
      {
        "version": "6.2.3.3",
        "status": "affected"
      },
      {
        "version": "6.2.3.4",
        "status": "affected"
      },
      {
        "version": "6.2.3.5",
        "status": "affected"
      },
      {
        "version": "6.2.3.6",
        "status": "affected"
      },
      {
        "version": "6.2.3.7",
        "status": "affected"
      },
      {
        "version": "6.2.3.9",
        "status": "affected"
      },
      {
        "version": "6.2.3.10",
        "status": "affected"
      },
      {
        "version": "6.2.3.11",
        "status": "affected"
      },
      {
        "version": "6.2.3.12",
        "status": "affected"
      },
      {
        "version": "6.2.3.13",
        "status": "affected"
      },
      {
        "version": "6.2.3.14",
        "status": "affected"
      },
      {
        "version": "6.2.3.15",
        "status": "affected"
      },
      {
        "version": "6.2.3.8",
        "status": "affected"
      },
      {
        "version": "6.2.3.16",
        "status": "affected"
      },
      {
        "version": "6.2.3.17",
        "status": "affected"
      },
      {
        "version": "6.2.3.18",
        "status": "affected"
      },
      {
        "version": "6.4.0",
        "status": "affected"
      },
      {
        "version": "6.4.0.1",
        "status": "affected"
      },
      {
        "version": "6.4.0.3",
        "status": "affected"
      },
      {
        "version": "6.4.0.2",
        "status": "affected"
      },
      {
        "version": "6.4.0.4",
        "status": "affected"
      },
      {
        "version": "6.4.0.5",
        "status": "affected"
      },
      {
        "version": "6.4.0.6",
        "status": "affected"
      },
      {
        "version": "6.4.0.7",
        "status": "affected"
      },
      {
        "version": "6.4.0.8",
        "status": "affected"
      },
      {
        "version": "6.4.0.9",
        "status": "affected"
      },
      {
        "version": "6.4.0.10",
        "status": "affected"
      },
      {
        "version": "6.4.0.11",
        "status": "affected"
      },
      {
        "version": "6.4.0.12",
        "status": "affected"
      },
      {
        "version": "6.4.0.13",
        "status": "affected"
      },
      {
        "version": "6.4.0.14",
        "status": "affected"
      },
      {
        "version": "6.4.0.15",
        "status": "affected"
      },
      {
        "version": "6.4.0.16",
        "status": "affected"
      },
      {
        "version": "6.4.0.17",
        "status": "affected"
      },
      {
        "version": "6.6.0",
        "status": "affected"
      },
      {
        "version": "6.6.0.1",
        "status": "affected"
      },
      {
        "version": "6.6.1",
        "status": "affected"
      },
      {
        "version": "6.6.3",
        "status": "affected"
      },
      {
        "version": "6.6.4",
        "status": "affected"
      },
      {
        "version": "6.6.5",
        "status": "affected"
      },
      {
        "version": "6.6.5.1",
        "status": "affected"
      },
      {
        "version": "6.6.5.2",
        "status": "affected"
      },
      {
        "version": "6.6.7",
        "status": "affected"
      },
      {
        "version": "6.6.7.1",
        "status": "affected"
      },
      {
        "version": "6.7.0",
        "status": "affected"
      },
      {
        "version": "6.7.0.1",
        "status": "affected"
      },
      {
        "version": "6.7.0.2",
        "status": "affected"
      },
      {
        "version": "6.7.0.3",
        "status": "affected"
      },
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "version": "7.0.0.1",
        "status": "affected"
      },
      {
        "version": "7.0.1",
        "status": "affected"
      },
      {
        "version": "7.0.1.1",
        "status": "affected"
      },
      {
        "version": "7.0.2",
        "status": "affected"
      },
      {
        "version": "7.0.2.1",
        "status": "affected"
      },
      {
        "version": "7.0.3",
        "status": "affected"
      },
      {
        "version": "7.0.4",
        "status": "affected"
      },
      {
        "version": "7.1.0",
        "status": "affected"
      },
      {
        "version": "7.1.0.1",
        "status": "affected"
      },
      {
        "version": "7.1.0.2",
        "status": "affected"
      }
    ]
  }
]

Social References

More

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.9%

Related for CVE-2022-20941