CVE-2022-20656

Path Traversal: '../filedir' (CWE-24)

Published: Nov 15, 2024 / Updated: 4d ago

010
CVSS 6.5EPSS 0.05%Medium
CVE info copied to clipboard

A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system. This vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to write arbitrary files to the host system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2022-20656. See article

Jan 12, 2022 at 5:11 PM / unknown
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 15, 2024 at 3:42 PM
CVE Assignment

NVD published the first details for CVE-2022-20656

Nov 15, 2024 at 4:15 PM
CVSS

A CVSS base score of 6.5 has been assigned.

Nov 15, 2024 at 4:20 PM / nvd
EPSS

EPSS Score was set to: 0.05% (Percentile: 17.4%)

Nov 18, 2024 at 5:15 PM
Static CVE Timeline Graph

Affected Systems

Cisco/epnm
+null more

News

Update Fri Nov 15 22:29:23 UTC 2024
Update Fri Nov 15 22:29:23 UTC 2024
CVE-2022-20656
A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system. This vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to write arbitrary files to the host system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Path Traversal Vulnerability
Cisco - MEDIUM - CVE-2022-20656 A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system. This vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to write arbitrary files to the host system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
CVE-2022-20656 | Cisco Evolved Programmable Network Manager up to 5.1.2 Request path traversal (cisco-sa-pi-epnm-path-trav-zws324yn)
A vulnerability, which was classified as problematic , has been found in Cisco Evolved Programmable Network Manager and Prime Infrastructure . This issue affects some unknown processing of the component Request Handler . The manipulation leads to path traversal: '../filedir'. The identification of this vulnerability is CVE-2022-20656 . The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
CVE-2022-20656 Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Path Traversal Vulnerability
A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system. This vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to write arbitrary files to the host system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these...
See 59 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:High
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI