Command Injection Vulnerability in ConfD Could Allow Authenticated Attacker to Execute Arbitrary Commands with Root Privileges
CVE-2022-20655
8.8HIGH
Key Information
- Vendor
- Cisco
- Status
- Cisco iOS Xr Software
- Cisco Virtual Topology System (vts)
- Cisco Network Services Orchestrator
- Cisco Enterprise Nfv Infrastructure Software
- Vendor
- CVE Published:
- 15 November 2024
Badges
👾 Exploit Exists
Summary
A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.
Affected Version(s)
Cisco IOS XR Software =
Cisco Virtual Topology System (VTS) =
Cisco Network Services Orchestrator =
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published.
Vulnerability Reserved.
- 👾
Exploit exists.
Collectors
NVD DatabaseMitre Database