7.2
CVSSv3

CVE-2022-20829

Published: 24/06/2022 Updated: 07/11/2023
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the malicious user to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco isa_3000_firmware

cisco asa_5585-x_firmware

cisco asa_5512-x_firmware

cisco asa_5515-x_firmware

cisco adaptive_security_device_manager

Vendor Advisories

A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Softwa ...

Github Repositories

A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)

The Way The Way is a tool for unpacking, repacking, and creating malicious Cisco Adaptive Security Device Manager (ASDM) packages ASDM is the Java-based administrative GUI for Adaptive Security Appliance (ASA) systems (eg firewalls and VPNs) The ASDM package is hosted on the ASA and sub-components are downloaded each time an administrator connects to the ASA via ASDM An at

Cisco ASA Software and ASDM Security Research

Cisco ASA Research This repository contains slides and code presented at Black Hat USA 2022 and DEF CON 30 The following can be found: Slides DEF CON 30 and Black Hat slide decks The DEF CON deck is slightly longer due to a longer time slot theway - a tool for creating malicious/distributable ASDM packages for the Cisco ASA (CVE-2022-20829) whatsup - a tool for creating

Recent Articles

Cisco warns of security holes in its security appliances
The Register • Jessica Lyons Hardcastle • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Bugs potentially useful for rogue insiders, admin account hijackers

Cisco has alerted customers to another four vulnerabilities in its products, including a high-severity flaw in its email and web security appliances.  The networking giant has issued a patch for that bug, tracked as CVE-2022-20664. The flaw is present in the web management interface of Cisco's Secure Email and Web Manager and Email Security Appliance in both the virtual and hardware appliances. Some earlier versions of both products, we note, have reached end of life, and so the manufacture...