#VU62329 Path traversal in Cisco Systems, Inc products - CVE-2022-20720 

 

#VU62329 Path traversal in Cisco Systems, Inc products - CVE-2022-20720

Published: April 14, 2022


Vulnerability identifier: #VU62329
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-20720
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
800 Series Industrial Integrated Services Routers
Industrial Ethernet 4000 Series Switches
800 Series Integrated Services Routers
Cisco 1000 Series Integrated Services Routers
4000 Series Integrated Services Routers
Cisco ASR 1000 Series Aggregation Services Routers
Catalyst 9x00 Series Switches
Catalyst IE3400 Rugged Series
Embedded Services 3300 Series Switches
IR510 WPAN Industrial Routers
IC3000 Industrial Compute Gateway
CGR1000 Compute Modules
Cisco IOx
Cisco IOS XE
Cisco IOS
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the Cisco IOx application hosting environment. A remote administrator can send a specially crafted HTTP request and read or write arbitrary files on the system.


Remediation

Install updates from vendor's website.

External links