MEDIUM · 5.5

CVE-2022-20727

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, ex...

Vulnerability Description

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

CVSS Score

5.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
CiscoCgr1000 Compute Module< 1.15.0.1
CiscoIc3000 Industrial Compute Gateway< 1.4.1
CiscoIr510 Operating System< 6.5.9
CiscoIos15.2\(5\)e1
CiscoIos Xe16.3.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-20727?

CVE-2022-20727 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, ex...

How severe is CVE-2022-20727?

CVE-2022-20727 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-20727?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Cgr1000 Compute Module, Cisco Ic3000 Industrial Compute Gateway, Cisco Ir510 Operating System, Cisco Ios, Cisco Ios Xe.