A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-file-access-VW36d28P | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
06 Oct 2023, 16:24
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco catalyst Sd-wan Manager
|
|
CPE | cpe:2.3:a:cisco:catalyst_sd-wan_manager:-:*:*:*:*:*:*:* |
29 Sep 2023, 15:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:sd-wan_manager:-:*:*:*:*:*:*:* | |
First Time |
Cisco sd-wan Manager
|
27 Jun 2023, 19:00
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-04-15 15:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-20716
Mitre link : CVE-2022-20716
CVE.ORG link : CVE-2022-20716
JSON object : View
Products Affected
cisco
- sd-wan_vsmart_controller_software
- catalyst_sd-wan_manager
- sd-wan
- sd-wan_vedge_router
- sd-wan_solution
- sd-wan_vedge_cloud
- sd-wan_vbond_orchestrator
CWE