First published: Wed Apr 13 2022(Updated: )
Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj This advisory is part of the April 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: Cyrille CHATRAS Orange group for reporting the following vulnerabilitiesCVE-2022-20719 CVE-2022-20720 CVE-2022-20721 CVE-2022-20722 CVE-2022-20723 CVE-2022-20724 CVE-2022-20725. CVE-2022-20718 the Cisco Advanced Security Initiatives GroupCVE-2022-20720: These vulnerabilities were also found during internal security testing by X.B. the Cisco Advanced Security Initiatives GroupCVE-2022-20677: by X.B. the Cisco ASIG
Affected Software | Affected Version | How to fix |
---|---|---|
=IR510 WPAN Industrial Routers<IR510 Operating System 6.5.9=IOS XE-based devices configured with IOx<Cisco IOS XE Software releases: 16.12(7) (All but CSCvy16608 are resolved in 16.12(6)) 17.3(5) 17.6(2) 17.7(1) and later For more information, see the Cisco IOS and IOS XE Software Checker section below.>=IC3000 Industrial Compute Gateways<=IE 4000 Series Switches<Not fixed; IOx has reached end of life on the Cisco IE 4000 Series Switches.=CGR1000 Compute Modules<IOx image for CGR1000 Compute Module 1.15.0.1=800 Series ISRs<Not fixed; IOx has reached end of life on Cisco 800 Series ISRs.=800 Series Industrial ISRs<Cisco IOS Software Release 15.9(3)M5 and later. | IR510 Operating System 6.5.9 Cisco IOS XE Software releases:
16.12(7) (All but CSCvy16608 are resolved in 16.12(6))
17.3(5)
17.6(2)
17.7(1) and later
For more information, see the Cisco IOS and IOS XE Software Checker section below. Not fixed; IOx has reached end of life on the Cisco IE 4000 Series Switches. IOx image for CGR1000 Compute Module 1.15.0.1 Not fixed; IOx has reached end of life on Cisco 800 Series ISRs. Cisco IOS Software Release 15.9(3)M5 and later. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of Cisco IOx Application Hosting Environment Vulnerabilities (cisco-sa-iox-yuXQ6hFj) is high with a severity value of 7.5.
Multiple Cisco platforms are affected by Cisco IOx Application Hosting Environment Vulnerabilities (cisco-sa-iox-yuXQ6hFj) including IR510 WPAN Industrial Routers, IOS XE-based devices configured with IOx, IC3000 Industrial Compute Gateways, CGR1000 Compute Modules, and 800 Series ISRs.
An attacker can exploit Cisco IOx Application Hosting Environment Vulnerabilities (cisco-sa-iox-yuXQ6hFj) to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, and install applications without being authorized.
There are fixes available for Cisco IOx Application Hosting Environment Vulnerabilities (cisco-sa-iox-yuXQ6hFj) depending on the Cisco platform being used. Refer to the Cisco Security Advisory for more information.
The Common Weakness Enumeration (CWE) for Cisco IOx Application Hosting Environment Vulnerabilities (cisco-sa-iox-yuXQ6hFj) is CWE-79, which refers to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').