We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-20939

Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability



Description

A vulnerability in the web-based management interface of Cisco Smart Software Manager On-Prem could allow an authenticated, remote attacker to elevate privileges on an affected system. This vulnerability is due to inadequate protection of sensitive user information. An attacker could exploit this vulnerability by accessing certain logs on an affected system. A successful exploit could allow the attacker to use the obtained information to elevate privileges to System Admin.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Reserved 2021-11-02 | Published 2024-11-15 | Updated 2024-11-15 | Assigner cisco


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

Insecure Storage of Sensitive Information

Product status

Default status
unknown

7-202001
affected

1.1
affected

6.3.0
affected

8-202004
affected

5.1.0 (LD)
affected

8-202006
affected

1.2
affected

1.3
affected

8-202012
affected

8-202010
affected

8-202008
affected

8-202102
affected

1.4
affected

8-202105
affected

8-202108
affected

8-202112
affected

8-202201
affected

References

sec.cloudapps.cisco.com/...y/cisco-sa-cssm-priv-esc-SEjz69dv (cisco-sa-cssm-priv-esc-SEjz69dv)

sec.cloudapps.cisco.com/...cisco-sa-bw-thinrcpt-xss-gSj4CecU

cve.org (CVE-2022-20939)

nvd.nist.gov (CVE-2022-20939)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-20939

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.