mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
191 lines
7.2 KiB
JSON
191 lines
7.2 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2022-20949",
|
||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||
|
"published": "2022-11-15T21:15:35.833",
|
||
|
"lastModified": "2022-11-22T14:49:57.103",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "A vulnerability in the management web server of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with high privileges to execute configuration commands on an affected system. This vulnerability exists because access to HTTPS endpoints is not properly restricted on an affected device. An attacker could exploit this vulnerability by sending specific messages to the affected HTTPS handler. A successful exploit could allow the attacker to perform configuration changes on the affected system, which should be configured and managed only through Cisco Firepower Management Center (FMC) Software."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "HIGH",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.9,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 1.2,
|
||
|
"impactScore": 3.6
|
||
|
},
|
||
|
{
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "HIGH",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 6.5,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 1.2,
|
||
|
"impactScore": 5.2
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.1.0",
|
||
|
"versionEndIncluding": "6.1.0.7",
|
||
|
"matchCriteriaId": "64116F5B-671C-46DB-A78D-AB14AAF946FD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.2.0",
|
||
|
"versionEndIncluding": "6.2.0.6",
|
||
|
"matchCriteriaId": "DD237542-FED6-4013-AD9F-18891954FE05"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.2.2",
|
||
|
"versionEndIncluding": "6.2.2.5",
|
||
|
"matchCriteriaId": "1F74A25A-601D-470D-BA43-EA68ADD266C6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.2.3",
|
||
|
"versionEndIncluding": "6.2.3.18",
|
||
|
"matchCriteriaId": "D58D7217-F6F5-4B58-B59C-E5C8781C87A9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.3.0",
|
||
|
"versionEndIncluding": "6.3.0.5",
|
||
|
"matchCriteriaId": "EDE0C110-518D-4E51-BCEB-F4E9FC448278"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.4.0",
|
||
|
"versionEndIncluding": "6.4.0.15",
|
||
|
"matchCriteriaId": "874E0E13-4A9E-4296-BEE6-F5B1077411A0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.5.0",
|
||
|
"versionEndIncluding": "6.5.0.5",
|
||
|
"matchCriteriaId": "171E1C5D-68C5-4BBC-AE18-D1518A1B7277"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.6.0",
|
||
|
"versionEndIncluding": "6.6.5.2",
|
||
|
"matchCriteriaId": "6362D78F-F131-46E4-8F0E-C7F218500017"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.7.0",
|
||
|
"versionEndIncluding": "6.7.0.3",
|
||
|
"matchCriteriaId": "1110632C-526F-4025-A7BE-0CF9F37E5F9E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.0.0",
|
||
|
"versionEndIncluding": "7.0.3",
|
||
|
"matchCriteriaId": "89DFD86B-768D-4301-92DB-B73C14255123"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "AD48BE40-C647-429A-81B6-59E125BBE415"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B7533780-0DF9-41BE-8455-F60676785689"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "469EA365-DED5-4436-AAC2-5553529DE700"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4D94F400-5A35-41F5-B37F-E9DA6F87ED8E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "16FD5D12-CF1A-4990-99B3-1840EFBA5611"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FCD2D11D-FF08-44E4-BF67-D8DD1E701FCD"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-privesc-7GqR2th",
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"tags": [
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|