// For flags

CVE-2022-20867

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account.
This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.

Una vulnerabilidad en la interfaz de administración basada en web de Cisco Email Security Appliance y Cisco Secure Email and Web Manager podría permitir que un atacante remoto autenticado realice ataques de inyección SQL como root en un sistema afectado. El atacante debe tener las credenciales de una cuenta de usuario con altos privilegios. Esta vulnerabilidad se debe a una validación incorrecta de los parámetros enviados por el usuario. Un atacante podría aprovechar esta vulnerabilidad autenticándose en la aplicación y enviando solicitudes maliciosas a un sistema afectado. Un exploit exitoso podría permitir al atacante obtener datos o modificar datos almacenados en la base de datos subyacente del sistema afectado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2021-11-02 CVE Reserved
  • 2022-11-03 CVE Published
  • 2024-05-26 EPSS Updated
  • 2024-11-20 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Asyncos
Search vendor "Cisco" for product "Asyncos"
>= 13.0 < 14.2.1
Search vendor "Cisco" for product "Asyncos" and version " >= 13.0 < 14.2.1"
-
Affected
in Cisco
Search vendor "Cisco"
Secure Email Gateway
Search vendor "Cisco" for product "Secure Email Gateway"
--
Safe
Cisco
Search vendor "Cisco"
Asyncos
Search vendor "Cisco" for product "Asyncos"
>= 12.0 < 14.2.0
Search vendor "Cisco" for product "Asyncos" and version " >= 12.0 < 14.2.0"
-
Affected
in Cisco
Search vendor "Cisco"
Secure Email And Web Manager
Search vendor "Cisco" for product "Secure Email And Web Manager"
--
Safe