cvelist/2022/20xxx/CVE-2022-20941.json
2024-01-25 17:01:28 +00:00

339 lines
17 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-20941",
"ASSIGNER": "psirt@cisco.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to access sensitive information.\r\n\r This vulnerability is due to missing authorization for certain resources in the web-based management interface together with insufficient entropy in these resource names. An attacker could exploit this vulnerability by sending a series of HTTPS requests to an affected device to enumerate resources on the device. A successful exploit could allow the attacker to retrieve sensitive information from the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Small Space of Random Values",
"cweId": "CWE-334"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Cisco",
"product": {
"product_data": [
{
"product_name": "Cisco Firepower Management Center",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "6.2.3"
},
{
"version_affected": "=",
"version_value": "6.2.3.1"
},
{
"version_affected": "=",
"version_value": "6.2.3.2"
},
{
"version_affected": "=",
"version_value": "6.2.3.3"
},
{
"version_affected": "=",
"version_value": "6.2.3.4"
},
{
"version_affected": "=",
"version_value": "6.2.3.5"
},
{
"version_affected": "=",
"version_value": "6.2.3.6"
},
{
"version_affected": "=",
"version_value": "6.2.3.7"
},
{
"version_affected": "=",
"version_value": "6.2.3.9"
},
{
"version_affected": "=",
"version_value": "6.2.3.10"
},
{
"version_affected": "=",
"version_value": "6.2.3.11"
},
{
"version_affected": "=",
"version_value": "6.2.3.12"
},
{
"version_affected": "=",
"version_value": "6.2.3.13"
},
{
"version_affected": "=",
"version_value": "6.2.3.14"
},
{
"version_affected": "=",
"version_value": "6.2.3.15"
},
{
"version_affected": "=",
"version_value": "6.2.3.8"
},
{
"version_affected": "=",
"version_value": "6.2.3.16"
},
{
"version_affected": "=",
"version_value": "6.2.3.17"
},
{
"version_affected": "=",
"version_value": "6.2.3.18"
},
{
"version_affected": "=",
"version_value": "6.4.0"
},
{
"version_affected": "=",
"version_value": "6.4.0.1"
},
{
"version_affected": "=",
"version_value": "6.4.0.3"
},
{
"version_affected": "=",
"version_value": "6.4.0.2"
},
{
"version_affected": "=",
"version_value": "6.4.0.4"
},
{
"version_affected": "=",
"version_value": "6.4.0.5"
},
{
"version_affected": "=",
"version_value": "6.4.0.6"
},
{
"version_affected": "=",
"version_value": "6.4.0.7"
},
{
"version_affected": "=",
"version_value": "6.4.0.8"
},
{
"version_affected": "=",
"version_value": "6.4.0.9"
},
{
"version_affected": "=",
"version_value": "6.4.0.10"
},
{
"version_affected": "=",
"version_value": "6.4.0.11"
},
{
"version_affected": "=",
"version_value": "6.4.0.12"
},
{
"version_affected": "=",
"version_value": "6.4.0.13"
},
{
"version_affected": "=",
"version_value": "6.4.0.14"
},
{
"version_affected": "=",
"version_value": "6.4.0.15"
},
{
"version_affected": "=",
"version_value": "6.4.0.16"
},
{
"version_affected": "=",
"version_value": "6.4.0.17"
},
{
"version_affected": "=",
"version_value": "6.6.0"
},
{
"version_affected": "=",
"version_value": "6.6.0.1"
},
{
"version_affected": "=",
"version_value": "6.6.1"
},
{
"version_affected": "=",
"version_value": "6.6.3"
},
{
"version_affected": "=",
"version_value": "6.6.4"
},
{
"version_affected": "=",
"version_value": "6.6.5"
},
{
"version_affected": "=",
"version_value": "6.6.5.1"
},
{
"version_affected": "=",
"version_value": "6.6.5.2"
},
{
"version_affected": "=",
"version_value": "6.6.7"
},
{
"version_affected": "=",
"version_value": "6.6.7.1"
},
{
"version_affected": "=",
"version_value": "6.7.0"
},
{
"version_affected": "=",
"version_value": "6.7.0.1"
},
{
"version_affected": "=",
"version_value": "6.7.0.2"
},
{
"version_affected": "=",
"version_value": "6.7.0.3"
},
{
"version_affected": "=",
"version_value": "7.0.0"
},
{
"version_affected": "=",
"version_value": "7.0.0.1"
},
{
"version_affected": "=",
"version_value": "7.0.1"
},
{
"version_affected": "=",
"version_value": "7.0.1.1"
},
{
"version_affected": "=",
"version_value": "7.0.2"
},
{
"version_affected": "=",
"version_value": "7.0.2.1"
},
{
"version_affected": "=",
"version_value": "7.0.3"
},
{
"version_affected": "=",
"version_value": "7.0.4"
},
{
"version_affected": "=",
"version_value": "7.1.0"
},
{
"version_affected": "=",
"version_value": "7.1.0.1"
},
{
"version_affected": "=",
"version_value": "7.1.0.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-info-disc-UghNRRhP",
"refsource": "MISC",
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-info-disc-UghNRRhP"
}
]
},
"source": {
"advisory": "cisco-sa-fmc-info-disc-UghNRRhP",
"discovery": "EXTERNAL",
"defects": [
"CSCwa85709"
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
}
]
}
}