CVE-2022-20789 is a vulnerability in Cisco Unified Communications Manager
Published on April 21, 2022
Cisco Unified Communications Products Arbitrary File Write Vulnerability
A vulnerability in the software upgrade process of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to write arbitrary files on the affected system. This vulnerability is due to improper restrictions applied to a system script. An attacker could exploit this vulnerability by using crafted variables during the execution of a system upgrade. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.
Vulnerability Analysis
CVE-2022-20789 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity, and no impact on availability.
Weakness Type
External Control of File Name or Path
The software allows user input to control or influence paths or file names that are used in filesystem operations.
Products Associated with CVE-2022-20789
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-20789 are published in Cisco Unified Communications Manager:
Affected Versions
Cisco Unified Communications Manager Version n/a is affected by CVE-2022-20789Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.