CVE-2022-20867
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account.
This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system.
Una vulnerabilidad en la interfaz de administración basada en web de Cisco Email Security Appliance y Cisco Secure Email and Web Manager podría permitir que un atacante remoto autenticado realice ataques de inyección SQL como root en un sistema afectado. El atacante debe tener las credenciales de una cuenta de usuario con altos privilegios. Esta vulnerabilidad se debe a una validación incorrecta de los parámetros enviados por el usuario. Un atacante podría aprovechar esta vulnerabilidad autenticándose en la aplicación y enviando solicitudes maliciosas a un sistema afectado. Un exploit exitoso podría permitir al atacante obtener datos o modificar datos almacenados en la base de datos subyacente del sistema afectado.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2021-11-02 CVE Reserved
- 2022-11-03 CVE Published
- 2024-05-26 EPSS Updated
- 2024-11-20 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Asyncos Search vendor "Cisco" for product "Asyncos" | >= 13.0 < 14.2.1 Search vendor "Cisco" for product "Asyncos" and version " >= 13.0 < 14.2.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Secure Email Gateway Search vendor "Cisco" for product "Secure Email Gateway" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asyncos Search vendor "Cisco" for product "Asyncos" | >= 12.0 < 14.2.0 Search vendor "Cisco" for product "Asyncos" and version " >= 12.0 < 14.2.0" | - |
Affected
| in | Cisco Search vendor "Cisco" | Secure Email And Web Manager Search vendor "Cisco" for product "Secure Email And Web Manager" | - | - |
Safe
|