Command Injection Vulnerability in ConfD Could Allow Authenticated Attacker to Execute Arbitrary Commands with Root Privileges

CVE-2022-20655
8.8HIGH

Key Information

Vendor
Cisco
Status
Cisco iOS Xr Software
Cisco Virtual Topology System (vts)
Cisco Network Services Orchestrator
Cisco Enterprise Nfv Infrastructure Software
Vendor
CVE Published:
15 November 2024

Badges

👾 Exploit Exists

Summary

A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.

Affected Version(s)

Cisco IOS XR Software =

Cisco Virtual Topology System (VTS) =

Cisco Network Services Orchestrator =

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published.

  • Vulnerability Reserved.

  • 👾

    Exploit exists.

Collectors

NVD DatabaseMitre Database
.