{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-20864","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","datePublished":"2022-10-10T20:43:16.392Z","dateUpdated":"2024-11-01T18:49:04.147Z","dateReserved":"2021-11-02T00:00:00.000Z"},"containers":{"cna":{"title":"Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability","datePublic":"2022-09-28T00:00:00.000Z","providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2022-10-10T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A vulnerability in the password-recovery disable feature of Cisco IOS XE ROM Monitor (ROMMON) Software for Cisco Catalyst Switches could allow an unauthenticated, local attacker to recover the configuration or reset the enable password. This vulnerability is due to a problem with the file and boot variable permissions in ROMMON. An attacker could exploit this vulnerability by rebooting the switch into ROMMON and entering specific commands through the console. A successful exploit could allow the attacker to read any file or reset the enable password."}],"affected":[{"vendor":"Cisco","product":"Cisco IOS XE Software","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"name":"20220928 Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability","tags":["vendor-advisory"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-info-disc-nrORXjO"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.6,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-538","cweId":"CWE-538"}]}],"source":{"advisory":"cisco-sa-iosxe-info-disc-nrORXjO","defect":[["CSCvx64514","CSCvx88952","CSCwa53008","CSCwa58212"]],"discovery":"INTERNAL"},"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T02:24:50.242Z"},"title":"CVE Program Container","references":[{"name":"20220928 Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability","tags":["vendor-advisory","x_transferred"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-info-disc-nrORXjO"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-01T18:40:27.471744Z","id":"CVE-2022-20864","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-01T18:49:04.147Z"}}]}}