Skip to content

Cisco IOx - Application Environment Cross-site Scripting Vulnerability (CVE-2022-20725)

Moderate
orange-cert-cc published GHSA-q2v9-qpmg-4qc4 Apr 19, 2022

Package

IOx (Cisco)

Affected versions

17.3.3

Patched versions

17.3(5)

Description

Overview

A vulnerability in the web-based Local Manager interface of the Cisco IOx application hosting environment could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based Local Manager interface of an affected device.

Impact

The attacker must have valid Local Manager credentials.This vulnerability is due to insufficient validation of user-supplied input by the web-based Local Manager interface.

Details

A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information.

Solution

Security patch

Upgrade to patched version (see above).

Workaround

There are no workarounds that address this vulnerability.

References

https://nvd.nist.gov/vuln/detail/CVE-2022-20725
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj

Credits

Orange CERT-CC
Cyrille CHATRAS at Orange group

Timeline

Date reported: June 06, 2021
Date fixed: April 13, 2022

Severity

Moderate
5.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

CVE ID

CVE-2022-20725

Weaknesses