Vulnerability Name:

CVE-2022-20829 (CCN-229533)

Assigned:2021-11-02
Published:2022-06-22
Updated:2022-10-26
Summary:A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine.
Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.
CVSS v3 Severity:7.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.1 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-345
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2022-20829

Source: XF
Type: UNKNOWN
cisco-cve202220829-code-exec(229533)

Source: MISC
Type: Exploit, Third Party Advisory
https://github.com/jbaines-r7/theway

Source: CCN
Type: Cisco Security Advisory cisco-sa-asa-asdm-sig-NPKvwDjm
Cisco Adaptive Security Device Manager and Adaptive Security Appliance Software Client-side Arbitrary Code Execution Vulnerability

Source: CISCO
Type: Vendor Advisory
20220622 Cisco Adaptive Security Device Manager and Adaptive Security Appliance Software Client-side Arbitrary Code Execution Vulnerability

Source: MISC
Type: Exploit, Third Party Advisory
https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:isa_3000_firmware:*:*:*:*:*:*:*:* (Version < 9.18.2)
  • AND
  • cpe:/h:cisco:isa_3000:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:cisco:asa_5585-x_firmware:*:*:*:*:*:*:*:* (Version < 9.18.2)
  • AND
  • cpe:/h:cisco:asa_5585-x:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:cisco:asa_5512-x_firmware:*:*:*:*:*:*:*:* (Version < 9.18.2)
  • AND
  • cpe:/h:cisco:asa_5512-x:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:cisco:asa_5515-x_firmware:*:*:*:*:*:*:*:* (Version < 9.18.2)
  • AND
  • cpe:/h:cisco:asa_5515-x:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:cisco:adaptive_security_device_manager:*:*:*:*:*:*:*:* (Version < 7.18.1.150)
  • AND
  • cpe:/h:cisco:firepower_9300:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_2110:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_2120:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_2130:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_2140:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_4110:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_4120:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_4140:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_4115:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_4125:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_4145:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_1010:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_1120:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_1140:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_1150:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firepower_4112:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:cisco:adaptive_security_device_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco isa 3000 firmware *
    cisco isa 3000 -
    cisco asa 5585-x firmware *
    cisco asa 5585-x -
    cisco asa 5512-x firmware *
    cisco asa 5512-x -
    cisco asa 5515-x firmware *
    cisco asa 5515-x -
    cisco adaptive security device manager *
    cisco firepower 9300 -
    cisco firepower 2110 -
    cisco firepower 2120 -
    cisco firepower 2130 -
    cisco firepower 2140 -
    cisco firepower 4110 -
    cisco firepower 4120 -
    cisco firepower 4140 -
    cisco firepower 4115 -
    cisco firepower 4125 -
    cisco firepower 4145 -
    cisco firepower 1010 -
    cisco firepower 1120 -
    cisco firepower 1140 -
    cisco firepower 1150 -
    cisco firepower 4112 -
    cisco adaptive security device manager *
    cisco adaptive security appliance software -