Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
Attack Vector Network
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Complete
Integrity Impact None
Availability Impact None
AV:N/AC:L/Au:S/C:C/I:N/A:N
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
|
References
Link | Resource |
---|---|
https://github.com/orangecertcc/security-research/security/advisories/GHSA-p3w5-w45c-c34x | Third Party Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2022-04-13T00:00:00
Updated: 2022-04-20T18:51:37
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20721
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-15T15:15:13.310
Modified: 2024-02-07T18:45:16.597
Link: CVE-2022-20721
JSON object: View
Redhat Information
No data.
CWE