Логотип exploitDog
bind:CVE-2022-20762
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20762

Количество 3

Количество 3

nvd логотип

CVE-2022-20762

почти 4 года назад

A vulnerability in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to insufficient access control in the affected CLI. An attacker could exploit this vulnerability by authenticating as a CEE ConfD CLI user and executing a specific CLI command. A successful exploit could allow an attacker to access privileged containers with root privileges.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-wxv8-vqc5-v4j2

почти 4 года назад

A vulnerability in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to insufficient access control in the affected CLI. An attacker could exploit this vulnerability by authenticating as a CEE ConfD CLI user and executing a specific CLI command. A successful exploit could allow an attacker to access privileged containers with root privileges.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2022-01522

почти 4 года назад

Уязвимость интерфейса командной строки CLI ConfD Common Execution Environment (CEE) среды выполнения для развертывания и управления облачными сетевыми функциями на основе контейнеров Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI), позволяющая нарушителю выполнить произвольные команды и повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20762

A vulnerability in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to insufficient access control in the affected CLI. An attacker could exploit this vulnerability by authenticating as a CEE ConfD CLI user and executing a specific CLI command. A successful exploit could allow an attacker to access privileged containers with root privileges.

CVSS3: 7.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-wxv8-vqc5-v4j2

A vulnerability in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to insufficient access control in the affected CLI. An attacker could exploit this vulnerability by authenticating as a CEE ConfD CLI user and executing a specific CLI command. A successful exploit could allow an attacker to access privileged containers with root privileges.

CVSS3: 7.8
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-01522

Уязвимость интерфейса командной строки CLI ConfD Common Execution Environment (CEE) среды выполнения для развертывания и управления облачными сетевыми функциями на основе контейнеров Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI), позволяющая нарушителю выполнить произвольные команды и повысить свои привилегии

CVSS3: 7.8
0%
Низкий
почти 4 года назад

Уязвимостей на страницу