Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-20798

Опубликовано: 15 июн. 2022
Источник: nvd
CVSS3: 9.8
CVSS2: 6.8
EPSS Низкий

Описание

A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:cisco:email_security_appliance:*:*:*:*:*:*:*:*
Версия от 14.0 (включая) до 14.0.1-033 (исключая)
cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
Версия от 13.0 (включая) до 13.0.0-277 (исключая)
cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
Версия от 13.6 (включая) до 13.6.2-090 (исключая)
cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
Версия от 13.8 (включая) до 13.8.1-090 (исключая)
cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
Версия от 14.0 (включая) до 14.0.0-418 (исключая)
cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
Версия от 14.1 (включая) до 14.1.0-250 (исключая)

EPSS

Процентиль: 79%
0.01312
Низкий

9.8 Critical

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-287
CWE-287

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.

CVSS3: 9.8
fstec
больше 3 лет назад

Уязвимость функции внешней аутентификации устройства управления защитой контента Cisco Secure Email and Web Manager (ранее Cisco Security Management Appliance и Cisco Email Security Appliance), связанная с ошибками разграничения доступа, позволяющая нарушителю получить полный доступ к веб-интерфейсу устройства

EPSS

Процентиль: 79%
0.01312
Низкий

9.8 Critical

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-287
CWE-287