cvelist/2022/20xxx/CVE-2022-20924.json
2022-11-15 21:00:35 +00:00

389 lines
20 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-20924",
"ASSIGNER": "psirt@cisco.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Check or Handling of Exceptional Conditions"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Cisco",
"product": {
"product_data": [
{
"product_name": "Cisco Adaptive Security Appliance (ASA) Software",
"version": {
"version_data": [
{
"version_value": "9.14.1",
"version_affected": "="
},
{
"version_value": "9.14.1.10",
"version_affected": "="
},
{
"version_value": "9.14.1.6",
"version_affected": "="
},
{
"version_value": "9.14.1.15",
"version_affected": "="
},
{
"version_value": "9.14.1.19",
"version_affected": "="
},
{
"version_value": "9.14.1.30",
"version_affected": "="
},
{
"version_value": "9.14.2",
"version_affected": "="
},
{
"version_value": "9.14.2.4",
"version_affected": "="
},
{
"version_value": "9.14.2.8",
"version_affected": "="
},
{
"version_value": "9.14.2.13",
"version_affected": "="
},
{
"version_value": "9.14.2.15",
"version_affected": "="
},
{
"version_value": "9.14.3",
"version_affected": "="
},
{
"version_value": "9.14.3.1",
"version_affected": "="
},
{
"version_value": "9.14.3.9",
"version_affected": "="
},
{
"version_value": "9.14.3.11",
"version_affected": "="
},
{
"version_value": "9.14.3.13",
"version_affected": "="
},
{
"version_value": "9.14.3.18",
"version_affected": "="
},
{
"version_value": "9.14.3.15",
"version_affected": "="
},
{
"version_value": "9.14.4",
"version_affected": "="
},
{
"version_value": "9.14.4.6",
"version_affected": "="
},
{
"version_value": "9.14.4.7",
"version_affected": "="
},
{
"version_value": "9.14.4.12",
"version_affected": "="
},
{
"version_value": "9.15.1",
"version_affected": "="
},
{
"version_value": "9.15.1.7",
"version_affected": "="
},
{
"version_value": "9.15.1.10",
"version_affected": "="
},
{
"version_value": "9.15.1.15",
"version_affected": "="
},
{
"version_value": "9.15.1.16",
"version_affected": "="
},
{
"version_value": "9.15.1.17",
"version_affected": "="
},
{
"version_value": "9.15.1.1",
"version_affected": "="
},
{
"version_value": "9.15.1.21",
"version_affected": "="
},
{
"version_value": "9.16.1",
"version_affected": "="
},
{
"version_value": "9.16.1.28",
"version_affected": "="
},
{
"version_value": "9.16.2",
"version_affected": "="
},
{
"version_value": "9.16.2.3",
"version_affected": "="
},
{
"version_value": "9.16.2.7",
"version_affected": "="
},
{
"version_value": "9.16.2.11",
"version_affected": "="
},
{
"version_value": "9.16.2.13",
"version_affected": "="
},
{
"version_value": "9.16.2.14",
"version_affected": "="
},
{
"version_value": "9.16.3",
"version_affected": "="
},
{
"version_value": "9.16.3.3",
"version_affected": "="
},
{
"version_value": "9.16.3.14",
"version_affected": "="
},
{
"version_value": "9.17.1",
"version_affected": "="
},
{
"version_value": "9.17.1.7",
"version_affected": "="
},
{
"version_value": "9.17.1.9",
"version_affected": "="
},
{
"version_value": "9.17.1.10",
"version_affected": "="
},
{
"version_value": "9.17.1.11",
"version_affected": "="
},
{
"version_value": "9.17.1.13",
"version_affected": "="
},
{
"version_value": "9.17.1.15",
"version_affected": "="
},
{
"version_value": "9.18.1",
"version_affected": "="
}
]
}
},
{
"product_name": "Cisco Firepower Threat Defense Software",
"version": {
"version_data": [
{
"version_value": "6.6.0",
"version_affected": "="
},
{
"version_value": "6.6.0.1",
"version_affected": "="
},
{
"version_value": "6.6.1",
"version_affected": "="
},
{
"version_value": "6.6.3",
"version_affected": "="
},
{
"version_value": "6.6.4",
"version_affected": "="
},
{
"version_value": "6.6.5",
"version_affected": "="
},
{
"version_value": "6.6.5.1",
"version_affected": "="
},
{
"version_value": "6.6.5.2",
"version_affected": "="
},
{
"version_value": "6.7.0",
"version_affected": "="
},
{
"version_value": "6.7.0.1",
"version_affected": "="
},
{
"version_value": "6.7.0.2",
"version_affected": "="
},
{
"version_value": "6.7.0.3",
"version_affected": "="
},
{
"version_value": "7.0.0",
"version_affected": "="
},
{
"version_value": "7.0.0.1",
"version_affected": "="
},
{
"version_value": "7.0.1",
"version_affected": "="
},
{
"version_value": "7.0.1.1",
"version_affected": "="
},
{
"version_value": "7.0.2",
"version_affected": "="
},
{
"version_value": "7.0.2.1",
"version_affected": "="
},
{
"version_value": "7.0.3",
"version_affected": "="
},
{
"version_value": "7.1.0",
"version_affected": "="
},
{
"version_value": "7.1.0.1",
"version_affected": "="
},
{
"version_value": "7.1.0.2",
"version_affected": "="
},
{
"version_value": "7.2.0",
"version_affected": "="
},
{
"version_value": "7.2.0.1",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-qsqBNM6x",
"refsource": "MISC",
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-qsqBNM6x"
}
]
},
"source": {
"advisory": "cisco-sa-asaftd-snmp-dos-qsqBNM6x",
"discovery": "INTERNAL",
"defects": [
"CSCwb05148"
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
}
]
}
}