Vulnerability Details : CVE-2022-20789
A vulnerability in the software upgrade process of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to write arbitrary files on the affected system. This vulnerability is due to improper restrictions applied to a system script. An attacker could exploit this vulnerability by using crafted variables during the execution of a system upgrade. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.
Vulnerability category: File inclusion
Products affected by CVE-2022-20789
- cpe:2.3:a:cisco:unified_communications_manager:12.5\(1\):*:*:*:-:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:12.5\(1\):*:*:*:session_management:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:14.0:*:*:*:-:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:14.0:*:*:*:session_management:*:*:*
Threat overview for CVE-2022-20789
Top countries where our scanners detected CVE-2022-20789
Top open port discovered on systems with this issue
5061
IPs affected by CVE-2022-20789 453
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2022-20789!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2022-20789
0.40%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-20789
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:L/Au:S/C:N/I:C/A:C |
8.0
|
9.2
|
NIST | |
4.9
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
1.2
|
3.6
|
Cisco Systems, Inc. | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |
1.2
|
5.2
|
NIST |
CWE ids for CVE-2022-20789
-
The product allows user input to control or influence paths or file names that are used in filesystem operations.Assigned by: ykramarz@cisco.com (Secondary)
-
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-20789
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-arb-write-74QzruUU
Cisco Unified Communications Products Arbitrary File Write VulnerabilityVendor Advisory
Jump to