Lucene search

K
cveCiscoCVE-2022-20676
HistoryApr 15, 2022 - 3:15 p.m.

CVE-2022-20676

2022-04-1515:15:12
CWE-250
CWE-20
cisco
web.nvd.nist.gov
65
cve-2022-20676
cisco
ios xe software
tcl
interpreter
vulnerability
privilege escalation
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root-level privileges. This vulnerability is due to insufficient input validation of data that is passed into the Tcl interpreter. An attacker could exploit this vulnerability by loading malicious Tcl code on an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root. By default, Tcl shell access requires privilege level 15.

Affected configurations

Nvd
Node
ciscoios_xeMatch16.12.1z2
OR
ciscoios_xeMatch17.2.1
OR
ciscoios_xeMatch17.2.1a
OR
ciscoios_xeMatch17.2.1r
OR
ciscoios_xeMatch17.2.1v
OR
ciscoios_xeMatch17.2.2
OR
ciscoios_xeMatch17.2.3
OR
ciscoios_xeMatch17.3.1
OR
ciscoios_xeMatch17.3.1a
OR
ciscoios_xeMatch17.3.1w
OR
ciscoios_xeMatch17.3.1x
OR
ciscoios_xeMatch17.3.1z
OR
ciscoios_xeMatch17.3.2
OR
ciscoios_xeMatch17.3.2a
OR
ciscoios_xeMatch17.3.3
OR
ciscoios_xeMatch17.3.3a
OR
ciscoios_xeMatch17.3.4
OR
ciscoios_xeMatch17.3.4a
OR
ciscoios_xeMatch17.3.4b
OR
ciscoios_xeMatch17.3.4c
OR
ciscoios_xeMatch17.4.1
OR
ciscoios_xeMatch17.4.1a
OR
ciscoios_xeMatch17.4.1b
OR
ciscoios_xeMatch17.4.1c
OR
ciscoios_xeMatch17.4.2
OR
ciscoios_xeMatch17.4.2a
OR
ciscoios_xeMatch17.5.1
OR
ciscoios_xeMatch17.5.1a
OR
ciscoios_xeMatch17.5.1c
VendorProductVersionCPE
ciscoios_xe16.12.1z2cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*
ciscoios_xe17.2.1cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*
ciscoios_xe17.2.1acpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*
ciscoios_xe17.2.1rcpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*
ciscoios_xe17.2.1vcpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*
ciscoios_xe17.2.2cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*
ciscoios_xe17.2.3cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*
ciscoios_xe17.3.1cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*
ciscoios_xe17.3.1acpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*
ciscoios_xe17.3.1wcpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*
Rows per page:
1-10 of 291

CNA Affected

[
  {
    "product": "Cisco IOS XE Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for CVE-2022-20676