{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-20655","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2021-11-02T13:28:29.037Z","datePublished":"2024-11-15T15:56:42.927Z","dateUpdated":"2024-11-15T21:00:58.460Z"},"containers":{"cna":{"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-11-15T15:56:42.927Z"},"descriptions":[{"lang":"en","value":"A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\r\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root."}],"affected":[{"vendor":"Cisco","product":"Cisco IOS XR Software","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Virtual Topology System (VTS)","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Network Services Orchestrator","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Enterprise NFV Infrastructure Software","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Catalyst SD-WAN","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Catalyst SD-WAN Manager","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco IOS XE Catalyst SD-WAN","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco SD-WAN vEdge Router","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Ultra Gateway Platform","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Carrier Packet Transport","versions":[{"version":"3.5","status":"affected"},{"version":"3.1","status":"affected"},{"version":"3.2","status":"affected"},{"version":"2.5","status":"affected"},{"version":"2.0","status":"affected"},{"version":"9.2.2","status":"affected"},{"version":"1.4.0","status":"affected"},{"version":"1.0","status":"affected"},{"version":"1.1","status":"affected"},{"version":"1.2","status":"affected"},{"version":"2.1.0","status":"affected"},{"version":"2.3.0","status":"affected"},{"version":"2.3.3","status":"affected"},{"version":"2.3.5","status":"affected"},{"version":"2.3.4","status":"affected"},{"version":"2.0.1","status":"affected"},{"version":"2.0.0","status":"affected"},{"version":"2.0.3","status":"affected"},{"version":"2.0.4","status":"affected"},{"version":"2.0.5","status":"affected"},{"version":"2.4.0","status":"affected"},{"version":"2.2.2","status":"affected"},{"version":"2.2.3","status":"affected"},{"version":"10.8.0","status":"affected"},{"version":"7.0.3","status":"affected"},{"version":"7.0.1","status":"affected"},{"version":"1.0.2","status":"affected"},{"version":"1.1.1","status":"affected"},{"version":"1.1.2","status":"affected"},{"version":"4.1","status":"affected"},{"version":"4.0","status":"affected"},{"version":"12.1.0","status":"affected"},{"version":"9.8.1","status":"affected"},{"version":"9.8.0","status":"affected"},{"version":"4.1.82","status":"affected"},{"version":"4.1.4","status":"affected"},{"version":"4.6.1","status":"affected"},{"version":"4.0.4","status":"affected"},{"version":"4.0.3","status":"affected"},{"version":"6.2.4","status":"affected"},{"version":"3.0.5","status":"affected"},{"version":"3.0.6","status":"affected"},{"version":"3.0.7","status":"affected"},{"version":"3.0.3","status":"affected"},{"version":"3.0.0","status":"affected"},{"version":"9.5.0","status":"affected"},{"version":"9.5.3","status":"affected"},{"version":"9.5.1","status":"affected"},{"version":"9.5.2","status":"affected"},{"version":"9.7.0","status":"affected"},{"version":"9.521","status":"affected"},{"version":"4.5.0","status":"affected"},{"version":"4.7.0","status":"affected"},{"version":"3.2.0","status":"affected"},{"version":"3.2.1","status":"affected"},{"version":"3.1.0","status":"affected"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"cwe","cweId":"CWE-78"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB","name":"cisco-sa-cli-cmdinj-4MttWZPB"},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh","name":"cisco-sa-confdcli-cmdinj-wybQDSSh"}],"metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-cli-cmdinj-4MttWZPB","discovery":"INTERNAL","defects":["CSCvq22323","CSCvq58164","CSCvq58224","CSCvq58168","CSCvq58183","CSCvq58226","CSCvz49669","CSCvq58204","CSCvm76596"]}},"adp":[{"affected":[{"vendor":"cisco","product":"ios_xr_software","cpes":["cpe:2.3:o:cisco:ios_xr_software:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"7.0.2","versionType":"custom"},{"version":"7.1.0","status":"affected","lessThan":"7.1.1","versionType":"custom"}]},{"vendor":"cisco","product":"virtual_topology_system","cpes":["cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"2.6.5","versionType":"custom"}]},{"vendor":"cisco","product":"network_services_orchestrator","cpes":["cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"4.3.9.1","versionType":"custom"},{"version":"4.4.0.0","status":"affected","lessThan":"4.4.5.6","versionType":"custom"},{"version":"4.5.0","status":"affected","lessThan":"4.5.7","versionType":"custom"},{"version":"4.6.0","status":"affected","lessThan":"4.6.1.7","versionType":"custom"},{"version":"4.7.0","status":"affected","lessThan":"4.7.1","versionType":"custom"},{"version":"5.1.0","status":"affected","lessThan":"5.1.0.1","versionType":"custom"}]},{"vendor":"cisco","product":"enterprise_nfv_infrastructure_software","cpes":["cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"3.12.1","versionType":"custom"}]},{"vendor":"cisco","product":"catalyst_sd-wan_manager","cpes":["cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"18.4.4","versionType":"custom"},{"version":"19.2.0","status":"affected","lessThan":"19.2.1","versionType":"custom"}]},{"vendor":"cisco","product":"ios_xe_catalyst_sd-wan","cpes":["cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"16.10.2","versionType":"custom"},{"version":"16.12.0","status":"affected","lessThan":"16.12.1b","versionType":"custom"},{"version":"17.2.0","status":"affected","lessThan":"17.2.1r","versionType":"custom"}]},{"vendor":"cisco","product":"sd-wan_vedge_router","cpes":["cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"18.4.4","versionType":"custom"},{"version":"19.2.0","status":"affected","lessThan":"19.2.1","versionType":"custom"}]},{"vendor":"cisco","product":"carrier_packet_transport","cpes":["cpe:2.3:a:cisco:carrier_packet_transport:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-15T19:43:18.170598Z","id":"CVE-2022-20655","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-15T21:00:58.460Z"}}]}}