Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj | Vendor Advisory |
https://github.com/orangecertcc/security-research/security/advisories/GHSA-xr7h-wjgg-h3rp | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Mar 2024, 23:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:ir510_operating_system:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.6
v3 : 5.3 |
Information
Published : 2022-04-15 15:15
Updated : 2024-03-04 23:03
NVD link : CVE-2022-20724
Mitre link : CVE-2022-20724
JSON object : View
Products Affected
cisco
- ic3000_industrial_compute_gateway
- ios
- ios_xe
- cgr1000_compute_module
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')