CVE-2022-20656

Severity
6.5MEDIUM
EPSS
0.2%
top 60.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 15

Description

A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system. This vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal char

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

🔴Vulnerability Details

2
GHSA
GHSA-rx94-q7ch-5ww2: A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path trave2024-11-15
CVEList
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Path Traversal Vulnerability2024-11-15

📋Vendor Advisories

2
Microsoft
Visual Studio Elevation of Privilege Vulnerability2024-01-09
Cisco
Cisco Prime Infrastructure and Evolved Programmable Network Manager Vulnerabilities2022-01-12
CVE-2022-20656 (MEDIUM CVSS 6.5) | A vulnerability in the web-based ma | cvebase.io