A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-file-access-VW36d28P | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Nov 2023, 03:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco catalyst Sd-wan Manager
|
|
CPE | cpe:2.3:a:cisco:catalyst_sd-wan_manager:-:*:*:*:*:*:*:* |
27 Jun 2023, 19:00
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-04-15 15:15
Updated : 2023-11-07 03:42
NVD link : CVE-2022-20716
Mitre link : CVE-2022-20716
JSON object : View
Products Affected
cisco
- sd-wan_vsmart_controller_software
- catalyst_sd-wan_manager
- sd-wan_vbond_orchestrator
- sd-wan_solution
- sd-wan_vedge_cloud
- sd-wan_vedge_router
- sd-wan
CWE