ID

VAR-202202-1288


CVE

CVE-2022-20738


TITLE

Cisco Umbrella Secure Web Gateway  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-004802

DESCRIPTION

A vulnerability in the Cisco Umbrella Secure Web Gateway service could allow an unauthenticated, remote attacker to bypass the file inspection feature. This vulnerability is due to insufficient restrictions in the file inspection feature. An attacker could exploit this vulnerability by downloading a crafted payload through specific methods. A successful exploit could allow the attacker to bypass file inspection protections and download a malicious payload. (DoS) It may be in a state. Cisco Umbrella is a cloud security platform of Cisco (Cisco). The platform protects against cyber threats such as phishing, malware, and ransomware

Trust: 1.8

sources: NVD: CVE-2022-20738 // JVNDB: JVNDB-2022-004802 // VULHUB: VHN-405291 // VULMON: CVE-2022-20738

AFFECTED PRODUCTS

vendor:ciscomodel:umbrella secure web gatewayscope:eqversion: -

Trust: 1.0

vendor:シスコシステムズmodel:cisco umbrella secure web gatewayscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco umbrella secure web gatewayscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-004802 // NVD: CVE-2022-20738

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-20738
value: CRITICAL

Trust: 1.0

ykramarz@cisco.com: CVE-2022-20738
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-20738
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202202-965
value: CRITICAL

Trust: 0.6

VULHUB: VHN-405291
value: HIGH

Trust: 0.1

VULMON: CVE-2022-20738
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2022-20738
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-405291
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-20738
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2022-20738
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2022-20738
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-405291 // VULMON: CVE-2022-20738 // JVNDB: JVNDB-2022-004802 // CNNVD: CNNVD-202202-965 // NVD: CVE-2022-20738 // NVD: CVE-2022-20738

PROBLEMTYPE DATA

problemtype:CWE-693

Trust: 1.0

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-004802 // NVD: CVE-2022-20738

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202202-965

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202202-965

PATCH

title:cisco-sa-swg-fbyps-3z4qT7purl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p

Trust: 0.8

title:Cisco Umbrella Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=183272

Trust: 0.6

title:Cisco: Cisco Umbrella Secure Web Gateway File Inspection Bypass Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-swg-fbyps-3z4qT7p

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: VULMON: CVE-2022-20738 // JVNDB: JVNDB-2022-004802 // CNNVD: CNNVD-202202-965

EXTERNAL IDS

db:NVDid:CVE-2022-20738

Trust: 3.4

db:JVNDBid:JVNDB-2022-004802

Trust: 0.8

db:CNNVDid:CNNVD-202202-965

Trust: 0.7

db:CNVDid:CNVD-2022-11521

Trust: 0.1

db:VULHUBid:VHN-405291

Trust: 0.1

db:VULMONid:CVE-2022-20738

Trust: 0.1

sources: VULHUB: VHN-405291 // VULMON: CVE-2022-20738 // JVNDB: JVNDB-2022-004802 // CNNVD: CNNVD-202202-965 // NVD: CVE-2022-20738

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-swg-fbyps-3z4qt7p

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-20738

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: VULHUB: VHN-405291 // VULMON: CVE-2022-20738 // JVNDB: JVNDB-2022-004802 // CNNVD: CNNVD-202202-965 // NVD: CVE-2022-20738

SOURCES

db:VULHUBid:VHN-405291
db:VULMONid:CVE-2022-20738
db:JVNDBid:JVNDB-2022-004802
db:CNNVDid:CNNVD-202202-965
db:NVDid:CVE-2022-20738

LAST UPDATE DATE

2024-08-14T14:10:59.948000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-405291date:2022-02-17T00:00:00
db:VULMONid:CVE-2022-20738date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2022-004802date:2023-05-08T06:23:00
db:CNNVDid:CNNVD-202202-965date:2022-03-10T00:00:00
db:NVDid:CVE-2022-20738date:2023-11-07T03:42:48.170

SOURCES RELEASE DATE

db:VULHUBid:VHN-405291date:2022-02-10T00:00:00
db:VULMONid:CVE-2022-20738date:2022-02-10T00:00:00
db:JVNDBid:JVNDB-2022-004802date:2023-05-08T00:00:00
db:CNNVDid:CNNVD-202202-965date:2022-02-10T00:00:00
db:NVDid:CVE-2022-20738date:2022-02-10T18:15:09.747