First published: Fri Apr 15 2022(Updated: )
Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | >=15.2\(5\)ex<15.2\(7\)e5 | |
Cisco Cdb-8p | ||
Cisco Cdb-8u | ||
Cisco IOS | =15.2\(8\)e | |
Cisco Cmicr-4pc | ||
Cisco Cmicr-4ps | ||
Cisco Cmicr-4pt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-20661.
The severity of CVE-2022-20661 is medium.
Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches are affected by CVE-2022-20661.
An attacker can execute persistent code at boot time or permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition.
To fix CVE-2022-20661, it is recommended to apply the necessary patches or updates provided by Cisco.