Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
AV:L/AC:L/Au:N/C:C/I:C/A:C
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
AND |
|
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2022-04-13T00:00:00
Updated: 2022-04-15T14:16:46
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20677
JSON object: View
NVD Information
Status : Modified
Published: 2022-04-15T15:15:12.413
Modified: 2023-11-07T03:42:36.037
Link: CVE-2022-20677
JSON object: View
Redhat Information
No data.