CVE-2022-20789

A vulnerability in the software upgrade process of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to write arbitrary files on the affected system. This vulnerability is due to improper restrictions applied to a system script. An attacker could exploit this vulnerability by using crafted variables during the execution of a system upgrade. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:unified_communications_manager:12.5\(1\):*:*:*:-:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:12.5\(1\):*:*:*:session_management:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:14.0:*:*:*:-:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:14.0:*:*:*:session_management:*:*:*

History

21 Nov 2024, 06:43

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-arb-write-74QzruUU - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-arb-write-74QzruUU - Vendor Advisory
CVSS v2 : 8.5
v3 : 6.5
v2 : 8.5
v3 : 4.9

Information

Published : 2022-04-21 19:15

Updated : 2024-11-21 06:43


NVD link : CVE-2022-20789

Mitre link : CVE-2022-20789

CVE.ORG link : CVE-2022-20789


JSON object : View

Products Affected

cisco

  • unified_communications_manager
CWE
CWE-73

External Control of File Name or Path

CWE-610

Externally Controlled Reference to a Resource in Another Sphere