Lucene search

K
nvd[email protected]NVD:CVE-2022-20942
HistoryNov 04, 2022 - 6:15 p.m.

CVE-2022-20942

2022-11-0418:15:11
CWE-863
CWE-359
web.nvd.nist.gov
cisco email security
authentication checks
sensitive information
crafted http request

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

45.4%

A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials.

This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device.

Affected configurations

NVD
Node
ciscoasyncosRange<14.2.1-015
OR
ciscoasyncosRange14.3.014.3.0-023
AND
ciscosecure_email_gatewayMatch-
Node
ciscoasyncosRange<14.2.0-217
OR
ciscoasyncosRange14.3.014.3.0-115
AND
ciscosecure_email_and_web_managerMatch-
Node
ciscoasyncosRange<12.0.5-011
OR
ciscoasyncosRange12.512.5.4-005
OR
ciscoasyncosRange14.014.0.2-012
AND
ciscosecure_web_applianceMatch-

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

45.4%

Related for NVD:CVE-2022-20942