ID

VAR-202205-1536


CVE

CVE-2022-20809


TITLE

Cisco Expressway  Series and  Cisco TelePresence Video Communication Server  Vulnerability regarding information leakage from log files in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011233

DESCRIPTION

Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to write files or disclose sensitive information on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Expressway Series is a software for accessing devices outside the firewall. The software provides simple, highly secure access for users outside the firewall, helping remote workers work more efficiently on the device of their choice. An attacker could exploit this vulnerability to view the credentials of other users sharing the device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV

Trust: 1.8

sources: NVD: CVE-2022-20809 // JVNDB: JVNDB-2022-011233 // VULHUB: VHN-405362 // VULMON: CVE-2022-20809

AFFECTED PRODUCTS

vendor:ciscomodel:telepresence video communication serverscope:lteversion:x14.0.7

Trust: 1.0

vendor:シスコシステムズmodel:cisco telepresence video communication server ソフトウェアscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco telepresence video communication server ソフトウェアscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco telepresence video communication server ソフトウェアscope:eqversion:cisco telepresence video communication server software

Trust: 0.8

sources: JVNDB: JVNDB-2022-011233 // NVD: CVE-2022-20809

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-20809
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2022-20809
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-20809
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202205-3719
value: MEDIUM

Trust: 0.6

VULHUB: VHN-405362
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-20809
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-405362
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-20809
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2022-20809
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2022-20809
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-405362 // JVNDB: JVNDB-2022-011233 // CNNVD: CNNVD-202205-3719 // NVD: CVE-2022-20809 // NVD: CVE-2022-20809

PROBLEMTYPE DATA

problemtype:CWE-532

Trust: 1.1

problemtype:Information leakage from log files (CWE-532) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-405362 // JVNDB: JVNDB-2022-011233 // NVD: CVE-2022-20809

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202205-3719

TYPE

log information leak

Trust: 0.6

sources: CNNVD: CNNVD-202205-3719

PATCH

title:cisco-sa-expressway-filewrite-bsFVwueVurl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV

Trust: 0.8

title:Multiple Cisco Repair measures for product log information disclosure vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195212

Trust: 0.6

title:Cisco: Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-expressway-filewrite-bsFVwueV

Trust: 0.1

sources: VULMON: CVE-2022-20809 // JVNDB: JVNDB-2022-011233 // CNNVD: CNNVD-202205-3719

EXTERNAL IDS

db:NVDid:CVE-2022-20809

Trust: 3.4

db:JVNDBid:JVNDB-2022-011233

Trust: 0.8

db:CNNVDid:CNNVD-202205-3719

Trust: 0.7

db:CS-HELPid:SB2022051906

Trust: 0.6

db:VULHUBid:VHN-405362

Trust: 0.1

db:VULMONid:CVE-2022-20809

Trust: 0.1

sources: VULHUB: VHN-405362 // VULMON: CVE-2022-20809 // JVNDB: JVNDB-2022-011233 // CNNVD: CNNVD-202205-3719 // NVD: CVE-2022-20809

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-expressway-filewrite-bsfvwuev

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-20809

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2022051906

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-20809/

Trust: 0.6

sources: VULHUB: VHN-405362 // VULMON: CVE-2022-20809 // JVNDB: JVNDB-2022-011233 // CNNVD: CNNVD-202205-3719 // NVD: CVE-2022-20809

SOURCES

db:VULHUBid:VHN-405362
db:VULMONid:CVE-2022-20809
db:JVNDBid:JVNDB-2022-011233
db:CNNVDid:CNNVD-202205-3719
db:NVDid:CVE-2022-20809

LAST UPDATE DATE

2024-11-23T22:15:46.690000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-405362date:2022-06-07T00:00:00
db:JVNDBid:JVNDB-2022-011233date:2023-08-21T05:52:00
db:CNNVDid:CNNVD-202205-3719date:2022-06-08T00:00:00
db:NVDid:CVE-2022-20809date:2024-11-21T06:43:35.887

SOURCES RELEASE DATE

db:VULHUBid:VHN-405362date:2022-05-26T00:00:00
db:JVNDBid:JVNDB-2022-011233date:2023-08-21T00:00:00
db:CNNVDid:CNNVD-202205-3719date:2022-05-18T00:00:00
db:NVDid:CVE-2022-20809date:2022-05-26T14:15:08.067