Vulnerability Details : CVE-2022-20798
A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2022-20798
Probability of exploitation activity in the next 30 days: 0.34%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 68 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-20798
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
Cisco Systems, Inc. |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-20798
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by:
- nvd@nist.gov (Primary)
- ykramarz@cisco.com (Secondary)
References for CVE-2022-20798
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-esa-auth-bypass-66kEcxQD
Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass VulnerabilityVendor Advisory
Products affected by CVE-2022-20798
- cpe:2.3:a:cisco:email_security_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*