Vulnerability identifier: #VU62329
Vulnerability risk: Low
CVSSv4.0: 4.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-20720
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
800 Series Industrial Integrated Services Routers
Other software /
Other software solutions
Industrial Ethernet 4000 Series Switches
Other software /
Other software solutions
800 Series Integrated Services Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco 1000 Series Integrated Services Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
4000 Series Integrated Services Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco ASR 1000 Series Aggregation Services Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Catalyst 9x00 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Catalyst IE3400 Rugged Series
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Embedded Services 3300 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
IR510 WPAN Industrial Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
IC3000 Industrial Compute Gateway
Hardware solutions /
Routers & switches, VoIP, GSM, etc
CGR1000 Compute Modules
Hardware solutions /
Firmware
Cisco IOx
Hardware solutions /
Firmware
Cisco IOS XE
Operating systems & Components /
Operating system
Cisco IOS
Operating systems & Components /
Operating system
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the Cisco IOx application hosting environment. A remote administrator can send a specially crafted HTTP request and read or write arbitrary files on the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
800 Series Industrial Integrated Services Routers: All versions
800 Series Integrated Services Routers: All versions
CGR1000 Compute Modules: All versions
Industrial Ethernet 4000 Series Switches: All versions
Cisco 1000 Series Integrated Services Routers: All versions
4000 Series Integrated Services Routers: All versions
Cisco ASR 1000 Series Aggregation Services Routers: All versions
Catalyst 9x00 Series Switches: All versions
Catalyst IE3400 Rugged Series: All versions
Embedded Services 3300 Series Switches: All versions
IR510 WPAN Industrial Routers: All versions
Cisco IOS XE: before 16.12(6), 17.3(5), 17.6(2), 17.7(1), 16.12(6), 16.12(6), 16.12(6), 16.12(6)
Cisco IOS: before 15.9(3)M5, 15.9(3)M5
Cisco IOx: before 1.15.0.1
IC3000 Industrial Compute Gateway: before 1.4.1
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.