Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on March 27, 2022, 12:19:05 PM

Title: Cisco Security Advisory - ConfD CLI Command Injection Vulnerability
Post by: Netwörkheäd on March 27, 2022, 12:19:05 PM
ConfD CLI Command Injection Vulnerability

<p class="line874">A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.</p>
<p class="line874">The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly <em>root</em>.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh</a></p>

     
         
Security Impact Rating:  High
   
   
       
CVE: CVE-2022-20655
Source: ConfD CLI Command Injection Vulnerability (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=ConfD%20CLI%20Command%20Injection%20Vulnerability&vs_k=1)