Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-20850 |
CWE-ID | CWE-22 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Cisco IOS XE SD-WAN Other software / Other software solutions Cisco SD-WAN vBond Orchestrator Other software / Other software solutions Cisco SD-WAN vManage Other software / Other software solutions Cisco SD-WAN Client/Desktop applications / Virtualization software Cisco SD-WAN vEdge Routers Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco SD-WAN vSmart Controller Hardware solutions / Other hardware appliances |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU67748
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-20850
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the CLI of stand-alone. A local user can send a specially crafted HTTP request and delete arbitrary files on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsCisco IOS XE SD-WAN: 16.9 - 16.10
Cisco SD-WAN: - - 18.4.0
Cisco SD-WAN vBond Orchestrator: All versions
Cisco SD-WAN vEdge Routers: All versions
Cisco SD-WAN vManage: All versions
Cisco SD-WAN vSmart Controller: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.