// For flags

CVE-2022-20821

Cisco IOS XR Open Port Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container. This vulnerability exists because the health check RPM opens TCP port 6379 by default upon activation. An attacker could exploit this vulnerability by connecting to the Redis instance on the open port. A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system.

Una vulnerabilidad en el RPM de comprobación de salud del software Cisco IOS XR podría permitir a un atacante remoto no autenticado acceder a la instancia de Redis que es ejecutado dentro del contenedor NOSi. Esta vulnerabilidad se presenta porque el RPM de comprobación de salud abre el puerto TCP 6379 por defecto al activarse. Un atacante podría explotar esta vulnerabilidad al conectarse a la instancia de Redis en el puerto abierto. Una explotación con éxito podría permitir al atacante escribir en la base de datos en memoria de Redis, escribir archivos arbitrarios en el sistema de archivos del contenedor y recuperar información sobre la base de datos de Redis. Dada la configuración del contenedor con sandbox en el que es ejecutada la instancia de Redis, un atacante remoto no podría ejecutar código remoto ni abusar de la integridad del sistema anfitrión del software Cisco IOS XR

Cisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-11-02 CVE Reserved
  • 2022-05-23 Exploited in Wild
  • 2022-05-26 CVE Published
  • 2022-06-13 KEV Due Date
  • 2023-12-17 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
8201
Search vendor "Cisco" for product "8201"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
8202
Search vendor "Cisco" for product "8202"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
8208
Search vendor "Cisco" for product "8208"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
8212
Search vendor "Cisco" for product "8212"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
8218
Search vendor "Cisco" for product "8218"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a1-24h
Search vendor "Cisco" for product "Ncs-55a1-24h"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a1-24q6h-s
Search vendor "Cisco" for product "Ncs-55a1-24q6h-s"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a1-36h-s
Search vendor "Cisco" for product "Ncs-55a1-36h-s"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a1-36h-se
Search vendor "Cisco" for product "Ncs-55a1-36h-se"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a1-36h-se-s
Search vendor "Cisco" for product "Ncs-55a1-36h-se-s"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a2-mod-hd-s
Search vendor "Cisco" for product "Ncs-55a2-mod-hd-s"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a2-mod-hx-s
Search vendor "Cisco" for product "Ncs-55a2-mod-hx-s"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a2-mod-s
Search vendor "Cisco" for product "Ncs-55a2-mod-s"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a2-mod-se-h-s
Search vendor "Cisco" for product "Ncs-55a2-mod-se-h-s"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs-55a2-mod-se-s
Search vendor "Cisco" for product "Ncs-55a2-mod-se-s"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 1001
Search vendor "Cisco" for product "Ncs 1001"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 1002
Search vendor "Cisco" for product "Ncs 1002"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 1004
Search vendor "Cisco" for product "Ncs 1004"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 5001
Search vendor "Cisco" for product "Ncs 5001"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 5002
Search vendor "Cisco" for product "Ncs 5002"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 5501-se
Search vendor "Cisco" for product "Ncs 5501-se"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 5502-se
Search vendor "Cisco" for product "Ncs 5502-se"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 5504
Search vendor "Cisco" for product "Ncs 5504"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 5508
Search vendor "Cisco" for product "Ncs 5508"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 5516
Search vendor "Cisco" for product "Ncs 5516"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 55a1
Search vendor "Cisco" for product "Ncs 55a1"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
--
Affected
in Cisco
Search vendor "Cisco"
Ncs 55a2
Search vendor "Cisco" for product "Ncs 55a2"
--
Safe