First published: Fri Apr 15 2022(Updated: )
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI API. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Software | =3.15.1xbs | |
Cisco IOS XE Software | =3.15.2xbs | |
Cisco IOS XE Software | =16.12.1 | |
Cisco IOS XE Software | =16.12.1a | |
Cisco IOS XE Software | =16.12.1c | |
Cisco IOS XE Software | =16.12.1s | |
Cisco IOS XE Software | =16.12.1t | |
Cisco IOS XE Software | =16.12.1w | |
Cisco IOS XE Software | =16.12.1x | |
Cisco IOS XE Software | =16.12.1y | |
Cisco IOS XE Software | =16.12.1z | |
Cisco IOS XE Software | =16.12.1z1 | |
Cisco IOS XE Software | =16.12.1z2 | |
Cisco IOS XE Software | =16.12.2 | |
Cisco IOS XE Software | =16.12.2a | |
Cisco IOS XE Software | =16.12.2s | |
Cisco IOS XE Software | =16.12.2t | |
Cisco IOS XE Software | =16.12.3 | |
Cisco IOS XE Software | =16.12.3a | |
Cisco IOS XE Software | =16.12.3s | |
Cisco IOS XE Software | =16.12.4 | |
Cisco IOS XE Software | =16.12.4a | |
Cisco IOS XE Software | =16.12.5 | |
Cisco IOS XE Software | =16.12.5a | |
Cisco IOS XE Software | =16.12.5b | |
Cisco IOS XE Software | =16.12.6 | |
Cisco IOS XE Software | =16.12.6a | |
Cisco IOS XE Software | =17.1.1 | |
Cisco IOS XE Software | =17.1.1a | |
Cisco IOS XE Software | =17.1.1s | |
Cisco IOS XE Software | =17.1.1t | |
Cisco IOS XE Software | =17.1.2 | |
Cisco IOS XE Software | =17.1.3 | |
Cisco IOS XE Software | =17.2.1 | |
Cisco IOS XE Software | =17.2.1a | |
Cisco IOS XE Software | =17.2.1r | |
Cisco IOS XE Software | =17.2.1v | |
Cisco IOS XE Software | =17.2.2 | |
Cisco IOS XE Software | =17.2.3 | |
Cisco IOS XE Software | =17.3.1 | |
Cisco IOS XE Software | =17.3.1a | |
Cisco IOS XE Software | =17.3.1w | |
Cisco IOS XE Software | =17.3.1x | |
Cisco IOS XE Software | =17.3.1z | |
Cisco IOS XE Software | =17.3.2 | |
Cisco IOS XE Software | =17.3.2a | |
Cisco IOS XE Software | =17.3.3 | |
Cisco IOS XE Software | =17.3.3a | |
Cisco IOS XE Software | =17.3.4 | |
Cisco IOS XE Software | =17.3.4a | |
Cisco IOS XE Software | =17.3.4b | |
Cisco IOS XE Software | =17.3.4c | |
Cisco IOS XE Software | =17.4.1 | |
Cisco IOS XE Software | =17.4.1a | |
Cisco IOS XE Software | =17.4.1b | |
Cisco IOS XE Software | =17.4.1c | |
Cisco IOS XE Software | =17.4.2 | |
Cisco IOS XE Software | =17.4.2a | |
Cisco IOS XE Software | =17.5.1 | |
Cisco IOS XE Software | =17.5.1a | |
Cisco IOS XE Software | =17.6.1 | |
Cisco IOS XE Software | =17.6.1a | |
Cisco IOS XE Software | =17.6.1w |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20693 has a severity rating of Medium, indicating a moderate risk for exploitation.
CVE-2022-20693 affects multiple versions of Cisco IOS XE, including 3.15.1xbs, 16.12.1, 17.1.1, and various others.
To mitigate CVE-2022-20693, it is recommended to upgrade to a patched version of Cisco IOS XE that addresses the vulnerability.
Exploiting CVE-2022-20693 may allow an authenticated attacker to execute injection attacks against the affected device.
An attacker needs to be authenticated and have access to the web UI of the affected device to exploit CVE-2022-20693.