{"id": "CVE-2022-20865", "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.7, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.8}, {"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.7, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.8}]}, "published": "2022-08-25T19:15:08.273", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-cmdinj-TxcLNZNH", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}, {"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The attacker would need to have Administrator privileges on the device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges."}, {"lang": "es", "value": "Una vulnerabilidad en la CLI del software Cisco FXOS podr\u00eda permitir a un atacante local autenticado inyectar comandos arbitrarios que son ejecutados con privilegios de root. El atacante necesitar\u00eda tener privilegios de administrador en el dispositivo. Esta vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente de los comandos suministrados por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad al autenticarse en un dispositivo y enviando una entrada dise\u00f1ada para el comando afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos en el sistema operativo subyacente con privilegios de root."}], "lastModified": "2023-11-07T03:43:09.773", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4110_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6417E0C-87B6-4C3B-B8A5-FC1C232E188E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4112_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8848D88-7FE6-43C7-804A-0C4CD3914E8D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "957D64EB-D60E-4775-B9A8-B21CA48ED3B1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4115_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E47E6035-3C82-4540-A582-0F6A3205AC8D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A694AD51-9008-4AE6-8240-98B17AB527EE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4120_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C24A01DF-056B-456B-ACC7-D5C2940996B3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4125_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7F8C83C-935A-46A6-882F-0622E92568AC"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71DCEF22-ED20-4330-8502-EC2DD4C9838F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4140_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24679CC8-00D9-4DD7-A47B-F8DEB7E2A735"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4145_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "265955A5-3285-4697-8E37-4D8F75C05E41"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "81F4868A-6D62-479C-9C19-F9AABDBB6B24"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4150_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "769776E9-4463-4F32-88FE-FA69C96D2070"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_9300_sm-40_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D298677-4811-4B59-9BB5-EC4238C2D34D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C13CF29B-9308-452B-B7E0-9E818B5A6C1E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_9300_sm-48_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EDE0F62-6A72-4C31-92B4-C05076FED460"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "421D91C3-8AB3-45E1-9E55-13ED1A4A623E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_9300_sm-56_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3168126C-C51A-4529-9186-54E107C722C2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2D741945-8B0A-408D-A5FE-D5B38DC6D46A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_9300_sm-56_x_3_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7341633B-2D7F-42E4-A07E-41E19FB2D682"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9308CA67-E949-4338-A890-22B3C4428D70"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}