6.7
CVSSv3

CVE-2022-20930

Published: 30/09/2022 Updated: 07/11/2023
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 0

Vulnerability Summary

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local malicious user to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful exploit could allow the malicious user to overwrite arbitrary system files, which could result in a denial of service (DoS) condition.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco sd-wan vbond orchestrator 20.8

cisco sd-wan vsmart controller 20.8

cisco sd-wan vsmart controller

cisco sd-wan vmanage

cisco sd-wan vbond orchestrator

cisco sd-wan vbond orchestrator 20.9

cisco sd-wan vsmart controller 20.9

cisco catalyst sd-wan manager 20.9

cisco catalyst sd-wan manager 20.8

cisco sd-wan

cisco sd-wan 20.8

cisco sd-wan 20.9

Vendor Advisories

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system This vulnerability is due to insufficient input validation An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account A success ...