// For flags

CVE-2022-20661

Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches Vulnerabilities

Severity Score

4.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.

Múltiples vulnerabilidades que afectan a Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches podrían permitir a un atacante ejecutar código persistente en el momento del arranque o impedir permanentemente el arranque del dispositivo, resultando en una condición de denegación de servicio (DoS) permanente. Para más información sobre estas vulnerabilidades, consulte la sección Details de este aviso

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2021-11-02 CVE Reserved
  • 2022-04-15 CVE Published
  • 2024-11-06 CVE Updated
  • 2024-11-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-665: Improper Initialization
  • CWE-1221: Incorrect Register Defaults or Module Parameters
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
>= 15.2\(5\)ex < 15.2\(7\)e5
Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5"
-
Affected
in Cisco
Search vendor "Cisco"
Cdb-8p
Search vendor "Cisco" for product "Cdb-8p"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
>= 15.2\(5\)ex < 15.2\(7\)e5
Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5"
-
Affected
in Cisco
Search vendor "Cisco"
Cdb-8u
Search vendor "Cisco" for product "Cdb-8u"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
>= 15.2\(5\)ex < 15.2\(7\)e5
Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5"
-
Affected
in Cisco
Search vendor "Cisco"
Cmicr-4pc
Search vendor "Cisco" for product "Cmicr-4pc"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
>= 15.2\(5\)ex < 15.2\(7\)e5
Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5"
-
Affected
in Cisco
Search vendor "Cisco"
Cmicr-4ps
Search vendor "Cisco" for product "Cmicr-4ps"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
>= 15.2\(5\)ex < 15.2\(7\)e5
Search vendor "Cisco" for product "Ios" and version " >= 15.2\(5\)ex < 15.2\(7\)e5"
-
Affected
in Cisco
Search vendor "Cisco"
Cmicr-4pt
Search vendor "Cisco" for product "Cmicr-4pt"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.2\(8\)e
Search vendor "Cisco" for product "Ios" and version "15.2\(8\)e"
-
Affected
in Cisco
Search vendor "Cisco"
Cmicr-4pc
Search vendor "Cisco" for product "Cmicr-4pc"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.2\(8\)e
Search vendor "Cisco" for product "Ios" and version "15.2\(8\)e"
-
Affected
in Cisco
Search vendor "Cisco"
Cmicr-4ps
Search vendor "Cisco" for product "Cmicr-4ps"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.2\(8\)e
Search vendor "Cisco" for product "Ios" and version "15.2\(8\)e"
-
Affected
in Cisco
Search vendor "Cisco"
Cmicr-4pt
Search vendor "Cisco" for product "Cmicr-4pt"
--
Safe