Логотип exploitDog
bind:CVE-2022-20797
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20797

Количество 3

Количество 3

nvd логотип

CVE-2022-20797

больше 3 лет назад

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Cisco Stealthwatch Enterprise, could allow an authenticated, remote attacker to execute arbitrary commands as an administrator on the underlying operating system. This vulnerability is due to insufficient user input validation by the web-based management interface of the affected software. An attacker could exploit this vulnerability by injecting arbitrary commands in the web-based management interface. A successful exploit could allow the attacker to make configuration changes on the affected device or cause certain services to restart unexpectedly.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-q878-24h5-xfhg

больше 3 лет назад

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Cisco Stealthwatch Enterprise, could allow an authenticated, remote attacker to execute arbitrary commands as an administrator on the underlying operating system. This vulnerability is due to insufficient user input validation by the web-based management interface of the affected software. An attacker could exploit this vulnerability by injecting arbitrary commands in the web-based management interface. A successful exploit could allow the attacker to make configuration changes on the affected device or cause certain services to restart unexpectedly.

CVSS3: 9.1
EPSS: Низкий
fstec логотип

BDU:2022-05105

больше 3 лет назад

Уязвимость веб-интерфейса системы анализа и обнаружения угроз Cisco Stealthwatch Enterprise, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20797

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Cisco Stealthwatch Enterprise, could allow an authenticated, remote attacker to execute arbitrary commands as an administrator on the underlying operating system. This vulnerability is due to insufficient user input validation by the web-based management interface of the affected software. An attacker could exploit this vulnerability by injecting arbitrary commands in the web-based management interface. A successful exploit could allow the attacker to make configuration changes on the affected device or cause certain services to restart unexpectedly.

CVSS3: 5.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-q878-24h5-xfhg

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Cisco Stealthwatch Enterprise, could allow an authenticated, remote attacker to execute arbitrary commands as an administrator on the underlying operating system. This vulnerability is due to insufficient user input validation by the web-based management interface of the affected software. An attacker could exploit this vulnerability by injecting arbitrary commands in the web-based management interface. A successful exploit could allow the attacker to make configuration changes on the affected device or cause certain services to restart unexpectedly.

CVSS3: 9.1
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-05105

Уязвимость веб-интерфейса системы анализа и обнаружения угроз Cisco Stealthwatch Enterprise, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.5
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу