CVE-2022-20661
Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
Múltiples vulnerabilidades que afectan a Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches podrían permitir a un atacante ejecutar código persistente en el momento del arranque o impedir permanentemente el arranque del dispositivo, resultando en una condición de denegación de servicio (DoS) permanente. Para más información sobre estas vulnerabilidades, consulte la sección Details de este aviso
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2021-11-02 CVE Reserved
- 2022-04-15 CVE Published
- 2024-11-06 CVE Updated
- 2024-11-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-665: Improper Initialization
- CWE-1221: Incorrect Register Defaults or Module Parameters
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | >= 15.2\(5\)ex < 15.2\(7\)e5 Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5" | - |
Affected
| in | Cisco Search vendor "Cisco" | Cdb-8p Search vendor "Cisco" for product "Cdb-8p" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | >= 15.2\(5\)ex < 15.2\(7\)e5 Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5" | - |
Affected
| in | Cisco Search vendor "Cisco" | Cdb-8u Search vendor "Cisco" for product "Cdb-8u" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | >= 15.2\(5\)ex < 15.2\(7\)e5 Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5" | - |
Affected
| in | Cisco Search vendor "Cisco" | Cmicr-4pc Search vendor "Cisco" for product "Cmicr-4pc" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | >= 15.2\(5\)ex < 15.2\(7\)e5 Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5" | - |
Affected
| in | Cisco Search vendor "Cisco" | Cmicr-4ps Search vendor "Cisco" for product "Cmicr-4ps" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | >= 15.2\(5\)ex < 15.2\(7\)e5 Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5" | - |
Affected
| in | Cisco Search vendor "Cisco" | Cmicr-4pt Search vendor "Cisco" for product "Cmicr-4pt" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.2\(8\)e Search vendor "Cisco" for product "Ios" and version "15.2\(8\)e" | - |
Affected
| in | Cisco Search vendor "Cisco" | Cmicr-4pc Search vendor "Cisco" for product "Cmicr-4pc" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.2\(8\)e Search vendor "Cisco" for product "Ios" and version "15.2\(8\)e" | - |
Affected
| in | Cisco Search vendor "Cisco" | Cmicr-4ps Search vendor "Cisco" for product "Cmicr-4ps" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.2\(8\)e Search vendor "Cisco" for product "Ios" and version "15.2\(8\)e" | - |
Affected
| in | Cisco Search vendor "Cisco" | Cmicr-4pt Search vendor "Cisco" for product "Cmicr-4pt" | - | - |
Safe
|