7.8
CWE
266
Advisory Published
Updated

CVE-2022-20681: Cisco IOS XE Software for Cisco Catalyst 9000 Family Switches and Catalyst 9000 Family Wireless Controllers Privilege Escalation Vulnerability

First published: Wed Apr 13 2022(Updated: )

A vulnerability in the CLI of Cisco IOS XE Software for Cisco Catalyst 9000 Family Switches and Cisco Catalyst 9000 Family Wireless Controllers could allow an authenticated, local attacker to elevate privileges to level 15 on an affected device. This vulnerability is due to insufficient validation of user privileges after the user executes certain CLI commands. An attacker could exploit this vulnerability by logging in to an affected device as a low-privileged user and then executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands with level 15 privileges on the affected device.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco IOS XE Software=16.11.1
Cisco IOS XE Software=16.11.1a
Cisco IOS XE Software=16.11.1b
Cisco IOS XE Software=16.11.1c
Cisco IOS XE Software=16.11.1s
Cisco IOS XE Software=16.11.2
Cisco IOS XE Software=16.12.1
Cisco IOS XE Software=16.12.1a
Cisco IOS XE Software=16.12.1c
Cisco IOS XE Software=16.12.1s
Cisco IOS XE Software=16.12.1t
Cisco IOS XE Software=16.12.1w
Cisco IOS XE Software=16.12.1x
Cisco IOS XE Software=16.12.1y
Cisco IOS XE Software=16.12.1z
Cisco IOS XE Software=16.12.1z1
Cisco IOS XE Software=16.12.1z2
Cisco IOS XE Software=16.12.2
Cisco IOS XE Software=16.12.2a
Cisco IOS XE Software=16.12.2s
Cisco IOS XE Software=16.12.2t
Cisco IOS XE Software=16.12.3
Cisco IOS XE Software=16.12.3a
Cisco IOS XE Software=16.12.3s
Cisco IOS XE Software=16.12.4
Cisco IOS XE Software=16.12.4a
Cisco IOS XE Software=16.12.5
Cisco IOS XE Software=16.12.5a
Cisco IOS XE Software=16.12.5b
Cisco IOS XE Software=16.12.6
Cisco IOS XE Software=16.12.6a
Cisco IOS XE Software=17.1.1
Cisco IOS XE Software=17.1.1a
Cisco IOS XE Software=17.1.1s
Cisco IOS XE Software=17.1.1t
Cisco IOS XE Software=17.1.2
Cisco IOS XE Software=17.1.3
Cisco IOS XE Software=17.2.1
Cisco IOS XE Software=17.2.1a
Cisco IOS XE Software=17.2.1r
Cisco IOS XE Software=17.2.1v
Cisco IOS XE Software=17.2.2
Cisco IOS XE Software=17.2.3
Cisco IOS XE Software=17.3.1
Cisco IOS XE Software=17.3.1a
Cisco IOS XE Software=17.3.1w
Cisco IOS XE Software=17.3.1x
Cisco IOS XE Software=17.3.1z
Cisco IOS XE Software=17.3.2
Cisco IOS XE Software=17.3.2a
Cisco IOS XE Software=17.3.3
Cisco IOS XE Software=17.3.3a
Cisco IOS XE Software=17.3.4
Cisco IOS XE Software=17.3.4a
Cisco IOS XE Software=17.3.4b
Cisco IOS XE Software=17.3.4c
Cisco IOS XE Software=17.4.1
Cisco IOS XE Software=17.4.1a
Cisco IOS XE Software=17.4.1b
Cisco IOS XE Software=17.4.1c
Cisco IOS XE Software=17.4.2
Cisco IOS XE Software=17.4.2a
Cisco IOS XE Software=17.5.1
Cisco IOS XE Software=17.5.1a
Cisco IOS XE Software=17.6.1
Cisco IOS XE Software=17.6.1a
Cisco IOS XE Software=17.6.1w
Cisco IOS XE Software

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-20681?

    CVE-2022-20681 has a critical severity rating, indicating a significant risk to affected systems.

  • How do I fix CVE-2022-20681?

    To remediate CVE-2022-20681, upgrade your Cisco IOS XE Software to the latest fixed version as specified in the security advisory.

  • Which devices are affected by CVE-2022-20681?

    CVE-2022-20681 affects Cisco Catalyst 9000 Family Switches and Cisco Catalyst 9000 Family Wireless Controllers running vulnerable IOS XE versions.

  • Can CVE-2022-20681 be exploited remotely?

    No, CVE-2022-20681 requires an authenticated, local attacker to exploit the vulnerability.

  • What type of attack does CVE-2022-20681 enable?

    CVE-2022-20681 allows an authenticated attacker to elevate their privileges to level 15 on the affected device.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203