Cisco SD-WAN CLI Elevation of Privilege via Improper Access Controls
CVE-2022-20818 Published on September 30, 2022
Cisco SD-WAN Software Privilege Escalation Vulnerabilities
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
Vulnerability Analysis
CVE-2022-20818 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. Public availability of a proof of concept (POC) exploit exists for CVE-2022-20818. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Path Traversal: '/../filedir'
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "/../" sequences that can resolve to a location that is outside of that directory.
Products Associated with CVE-2022-20818
Want to know whenever a new CVE is published for Cisco products? stack.watch will email you.
Affected Versions
Cisco SD-WAN Solution Version n/a is affected by CVE-2022-20818Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.