#VU62328 Execution with unnecessary privileges in Cisco Systems, Inc products - CVE-2022-20719


Vulnerability identifier: #VU62328

Vulnerability risk: Low

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-20719

CWE-ID: CWE-250

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
800 Series Industrial Integrated Services Routers
Other software / Other software solutions
Industrial Ethernet 4000 Series Switches
Other software / Other software solutions
800 Series Integrated Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco 1000 Series Integrated Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
4000 Series Integrated Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco ASR 1000 Series Aggregation Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
Catalyst 9x00 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc
Catalyst IE3400 Rugged Series
Hardware solutions / Routers & switches, VoIP, GSM, etc
Embedded Services 3300 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc
IR510 WPAN Industrial Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
IC3000 Industrial Compute Gateway
Hardware solutions / Routers & switches, VoIP, GSM, etc
CGR1000 Compute Modules
Hardware solutions / Firmware
Cisco IOx
Hardware solutions / Firmware
Cisco IOS XE
Operating systems & Components / Operating system
Cisco IOS
Operating systems & Components / Operating system

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to incomplete sanitization of parameters that are passed in as part of the IOx package descriptor. A remote administrator can execute arbitrary code on the underlying host operating system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

800 Series Industrial Integrated Services Routers: All versions

800 Series Integrated Services Routers: All versions

CGR1000 Compute Modules: All versions

Industrial Ethernet 4000 Series Switches: All versions

Cisco 1000 Series Integrated Services Routers: All versions

4000 Series Integrated Services Routers: All versions

Cisco ASR 1000 Series Aggregation Services Routers: All versions

Catalyst 9x00 Series Switches: All versions

Catalyst IE3400 Rugged Series: All versions

Embedded Services 3300 Series Switches: All versions

IR510 WPAN Industrial Routers: All versions

Cisco IOS XE: before 16.12(6), 17.3(5), 17.6(2), 17.7(1), 16.12(6), 16.12(6), 16.12(6), 16.12(6)

Cisco IOS: before 15.9(3)M5, 15.9(3)M5

Cisco IOx: before 1.15.0.1

IC3000 Industrial Compute Gateway: before 1.4.1


External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability