9
CVSSv2

CVE-2022-20723

Published: 15/04/2022 Updated: 07/02/2024
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an malicious user to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios xe 16.6.1

cisco ios xe 16.4.1

cisco ios xe 16.3.1

cisco ios xe 16.3.1a

cisco ios xe 16.3.2

cisco ios xe 16.3.3

cisco ios xe 16.5.1

cisco ios xe 16.5.1a

cisco ios xe 16.3.4

cisco ios xe 16.5.1b

cisco ios xe 16.4.2

cisco ios xe 16.3.5b

cisco ios xe 16.3.6

cisco ios xe 16.6.3

cisco ios xe 16.8.1

cisco ios xe 16.7.1

cisco ios xe 16.6.2

cisco ios xe 16.9.1

cisco ios xe 16.3.5

cisco ios xe 16.5.2

cisco ios xe 16.8.1a

cisco ios xe 16.8.1s

cisco ios xe 16.8.1b

cisco ios xe 16.8.2

cisco ios xe 16.7.2

cisco ios xe 16.8.1d

cisco ios xe 16.7.3

cisco ios xe 16.7.1a

cisco ios xe 16.7.1b

cisco ios xe 16.8.1c

cisco ios xe 16.8.1e

cisco ios xe 16.4.3

cisco ios xe 16.9.1s

cisco ios xe 16.9.1c

cisco ios xe 16.9.1b

cisco ios xe 16.5.3

cisco ios xe 16.3.7

cisco ios xe 16.3.8

cisco ios xe 16.9.1d

cisco ios xe 16.6.4s

cisco ios xe 16.6.4

cisco ios xe 16.10.1

cisco ios xe 16.7.4

cisco ios xe 16.9.1a

cisco ios xe 16.9.2a

cisco ios xe 16.9.2

cisco ios xe 16.6.4a

cisco ios xe 16.12.1

cisco ios xe 16.6.5

cisco ios xe 16.11.1

cisco ios xe 17.1.1

cisco ios xe 16.11.1a

cisco ios xe 16.12.1c

cisco ios xe 16.12.1t

cisco ios xe 16.11.2

cisco ios xe 16.12.1s

cisco ios xe 16.12.1a

cisco ios xe 16.12.1x

cisco ios xe 16.11.1c

cisco ios xe 16.11.1b

cisco ios xe 16.11.1s

cisco ios xe 16.12.1w

cisco ios xe 16.10.1s

cisco ios xe 16.10.1d

cisco ios xe 16.9.2s

cisco ios xe 16.6.6

cisco ios xe 16.9.3h

cisco ios xe 16.6.5b

cisco ios xe 16.6.5a

cisco ios xe 16.3.9

cisco ios xe 16.9.3a

cisco ios xe 16.10.1a

cisco ios xe 16.10.1f

cisco ios xe 16.10.1g

cisco ios xe 16.10.2

cisco ios xe 16.9.3

cisco ios xe 16.12.1y

cisco ios xe 16.10.1e

cisco ios xe 16.10.1b

cisco ios xe 16.8.3

cisco ios xe 16.9.3s

cisco ios xe 16.10.1c

cisco ios xe 16.9.4

cisco ios xe 16.12.2

cisco ios xe 16.6.7a

cisco ios xe 16.9.4c

cisco ios xe 16.12.2a

cisco ios xe 16.6.7

cisco ios xe 16.10.3

cisco ios xe 16.12.4

cisco ios xe 16.3.10

cisco ios xe 16.9.5

cisco ios xe 16.9.5f

cisco ios xe 16.6.8

cisco ios xe 16.12.3

cisco ios xe 17.2.1

cisco ios xe 17.4.1

cisco ios xe 16.6.9

cisco ios xe 17.1.1s

cisco ios xe 16.12.2t

cisco ios xe 17.1.1a

cisco ios xe 16.12.2s

cisco ios xe 16.12.3a

cisco ios xe 17.1.1t

cisco ios xe 16.3.11

cisco ios xe 17.2.1a

cisco ios xe 17.2.1v

cisco ios xe 16.12.3s

cisco ios xe 17.2.1r

cisco ios xe 17.1.2

cisco ios xe 16.12.4a

cisco ios xe 17.1.3

cisco ios xe 17.2.2

cisco ios xe 17.3.1

cisco ios xe 17.4.1a

cisco ios xe 17.3.2

cisco ios xe 17.4.1b

cisco ios xe 17.3.1a

cisco ios xe 17.3.2a

cisco ios xe 17.3.1w

cisco ios xe 17.2.3

cisco ios xe 16.9.6

cisco ios xe 17.3.1x

cisco ios xe 16.12.5

cisco ios xe 16.12.5a

cisco ios xe 17.5.1

cisco ios xe 17.3.1z

cisco ios xe 17.3.3

cisco ios xe 17.3.3a

cisco ios xe 17.4.1c

cisco ios xe 16.9.7

cisco ios xe 17.5.1a

cisco ios xe 17.6.1

cisco ios xe 17.3.4a

cisco ios xe 17.4.2

cisco ios xe 17.3.4b

cisco ios xe 17.6.1a

cisco ios xe 17.3.4c

cisco ios xe 16.6.10

cisco ios xe 17.4.2a

cisco ios xe 16.9.8

cisco ios xe 17.3.4

Vendor Advisories

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS ...