| Vulnerability Name: | CVE-2022-20656 (CCN-217116) | ||||||
| Assigned: | 2021-11-02 | ||||||
| Published: | 2022-01-12 | ||||||
| Updated: | 2022-01-12 | ||||||
| Summary: | Cisco Prime Infrastructure and Evolved Programmable Network Manager could allow a remote authenticated attacker to traverse directories on the system, caused by improper input validation of the HTTPS URL by the web-based management interface. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to write arbitrary files on the system. | ||||||
| CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) 5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||
| CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:C/A:N)
| ||||||
| Vulnerability Consequences: | Gain Access | ||||||
| References: | Source: MITRE Type: CNA CVE-2022-20656 Source: XF Type: UNKNOWN cisco-cve202220656-dir-traversal(217116) Source: CCN Type: Cisco Security Advisory cisco-sa-pi-epnm-path-trav-zws324yn Cisco Prime Infrastructure and Evolved Programmable Network Manager Vulnerabilities | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||