First published: Fri Apr 15 2022(Updated: )
Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Software | =16.3.1 | |
Cisco IOS XE Software | =16.3.1a | |
Cisco IOS XE Software | =16.3.2 | |
Cisco IOS XE Software | =16.3.3 | |
Cisco IOS XE Software | =16.3.4 | |
Cisco IOS XE Software | =16.3.5 | |
Cisco IOS XE Software | =16.3.5b | |
Cisco IOS XE Software | =16.3.6 | |
Cisco IOS XE Software | =16.3.7 | |
Cisco IOS XE Software | =16.3.8 | |
Cisco IOS XE Software | =16.3.9 | |
Cisco IOS XE Software | =16.3.10 | |
Cisco IOS XE Software | =16.3.11 | |
Cisco IOS XE Software | =16.4.1 | |
Cisco IOS XE Software | =16.4.2 | |
Cisco IOS XE Software | =16.4.3 | |
Cisco IOS XE Software | =16.5.1 | |
Cisco IOS XE Software | =16.5.1a | |
Cisco IOS XE Software | =16.5.1b | |
Cisco IOS XE Software | =16.5.2 | |
Cisco IOS XE Software | =16.5.3 | |
Cisco IOS XE Software | =16.6.1 | |
Cisco IOS XE Software | =16.6.2 | |
Cisco IOS XE Software | =16.6.3 | |
Cisco IOS XE Software | =16.6.4 | |
Cisco IOS XE Software | =16.6.4a | |
Cisco IOS XE Software | =16.6.4s | |
Cisco IOS XE Software | =16.6.5 | |
Cisco IOS XE Software | =16.6.5a | |
Cisco IOS XE Software | =16.6.5b | |
Cisco IOS XE Software | =16.6.6 | |
Cisco IOS XE Software | =16.6.7 | |
Cisco IOS XE Software | =16.6.7a | |
Cisco IOS XE Software | =16.6.8 | |
Cisco IOS XE Software | =16.6.9 | |
Cisco IOS XE Software | =16.6.10 | |
Cisco IOS XE Software | =16.7.1 | |
Cisco IOS XE Software | =16.7.1a | |
Cisco IOS XE Software | =16.7.1b | |
Cisco IOS XE Software | =16.7.2 | |
Cisco IOS XE Software | =16.7.3 | |
Cisco IOS XE Software | =16.7.4 | |
Cisco IOS XE Software | =16.8.1 | |
Cisco IOS XE Software | =16.8.1a | |
Cisco IOS XE Software | =16.8.1b | |
Cisco IOS XE Software | =16.8.1c | |
Cisco IOS XE Software | =16.8.1d | |
Cisco IOS XE Software | =16.8.1e | |
Cisco IOS XE Software | =16.8.1s | |
Cisco IOS XE Software | =16.8.2 | |
Cisco IOS XE Software | =16.8.3 | |
Cisco IOS XE Software | =16.9.1 | |
Cisco IOS XE Software | =16.9.1a | |
Cisco IOS XE Software | =16.9.1b | |
Cisco IOS XE Software | =16.9.1c | |
Cisco IOS XE Software | =16.9.1d | |
Cisco IOS XE Software | =16.9.1s | |
Cisco IOS XE Software | =16.9.2 | |
Cisco IOS XE Software | =16.9.2a | |
Cisco IOS XE Software | =16.9.2s | |
Cisco IOS XE Software | =16.9.3 | |
Cisco IOS XE Software | =16.9.3a | |
Cisco IOS XE Software | =16.9.3h | |
Cisco IOS XE Software | =16.9.3s | |
Cisco IOS XE Software | =16.9.4 | |
Cisco IOS XE Software | =16.9.4c | |
Cisco IOS XE Software | =16.9.5 | |
Cisco IOS XE Software | =16.9.5f | |
Cisco IOS XE Software | =16.9.6 | |
Cisco IOS XE Software | =16.9.7 | |
Cisco IOS XE Software | =16.9.8 | |
Cisco IOS XE Software | =16.10.1 | |
Cisco IOS XE Software | =16.10.1a | |
Cisco IOS XE Software | =16.10.1b | |
Cisco IOS XE Software | =16.10.1c | |
Cisco IOS XE Software | =16.10.1d | |
Cisco IOS XE Software | =16.10.1e | |
Cisco IOS XE Software | =16.10.1f | |
Cisco IOS XE Software | =16.10.1g | |
Cisco IOS XE Software | =16.10.1s | |
Cisco IOS XE Software | =16.10.2 | |
Cisco IOS XE Software | =16.10.3 | |
Cisco IOS XE Software | =16.11.1 | |
Cisco IOS XE Software | =16.11.1a | |
Cisco IOS XE Software | =16.11.1b | |
Cisco IOS XE Software | =16.11.1c | |
Cisco IOS XE Software | =16.11.1s | |
Cisco IOS XE Software | =16.11.2 | |
Cisco IOS XE Software | =16.12.1 | |
Cisco IOS XE Software | =16.12.1a | |
Cisco IOS XE Software | =16.12.1c | |
Cisco IOS XE Software | =16.12.1s | |
Cisco IOS XE Software | =16.12.1t | |
Cisco IOS XE Software | =16.12.1w | |
Cisco IOS XE Software | =16.12.1x | |
Cisco IOS XE Software | =16.12.1y | |
Cisco IOS XE Software | =16.12.2 | |
Cisco IOS XE Software | =16.12.2a | |
Cisco IOS XE Software | =16.12.2s | |
Cisco IOS XE Software | =16.12.2t | |
Cisco IOS XE Software | =16.12.3 | |
Cisco IOS XE Software | =16.12.3a | |
Cisco IOS XE Software | =16.12.3s | |
Cisco IOS XE Software | =16.12.4 | |
Cisco IOS XE Software | =16.12.4a | |
Cisco IOS XE Software | =16.12.5 | |
Cisco IOS XE Software | =16.12.5a | |
Cisco IOS XE Software | =17.1.1 | |
Cisco IOS XE Software | =17.1.1a | |
Cisco IOS XE Software | =17.1.1s | |
Cisco IOS XE Software | =17.1.1t | |
Cisco IOS XE Software | =17.1.2 | |
Cisco IOS XE Software | =17.1.3 | |
Cisco IOS XE Software | =17.2.1 | |
Cisco IOS XE Software | =17.2.1a | |
Cisco IOS XE Software | =17.2.1r | |
Cisco IOS XE Software | =17.2.1v | |
Cisco IOS XE Software | =17.2.2 | |
Cisco IOS XE Software | =17.2.3 | |
Cisco IOS XE Software | =17.3.1 | |
Cisco IOS XE Software | =17.3.1a | |
Cisco IOS XE Software | =17.3.1w | |
Cisco IOS XE Software | =17.3.1x | |
Cisco IOS XE Software | =17.3.1z | |
Cisco IOS XE Software | =17.3.2 | |
Cisco IOS XE Software | =17.3.2a | |
Cisco IOS XE Software | =17.3.3 | |
Cisco IOS XE Software | =17.3.3a | |
Cisco IOS XE Software | =17.3.4 | |
Cisco IOS XE Software | =17.3.4a | |
Cisco IOS XE Software | =17.3.4b | |
Cisco IOS XE Software | =17.3.4c | |
Cisco IOS XE Software | =17.4.1 | |
Cisco IOS XE Software | =17.4.1a | |
Cisco IOS XE Software | =17.4.1b | |
Cisco IOS XE Software | =17.4.1c | |
Cisco IOS XE Software | =17.4.2 | |
Cisco IOS XE Software | =17.4.2a | |
Cisco IOS XE Software | =17.5.1 | |
Cisco IOS XE Software | =17.5.1a | |
Cisco IOS XE Software | =17.6.1 | |
Cisco IOS XE Software | =17.6.1a | |
Cisco IR510 Operating System | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20719 is rated as high severity due to its potential to allow arbitrary command injection and code execution on the underlying host operating system.
To fix CVE-2022-20719, you should update the affected Cisco IOS XE or IR510 Operating Systems to the latest versions recommended by Cisco.
CVE-2022-20719 affects multiple Cisco platforms running the Cisco IOx application hosting environment.
Exploitation of CVE-2022-20719 can allow attackers to inject arbitrary commands and execute malicious code on the underlying host operating system.
As of now, there is no public indication that CVE-2022-20719 is actively being exploited in the wild, but organizations should still apply mitigations promptly.