Known Exploited Vulnerability
7.8
HIGH CVSS 3.1
CVE-2022-20775
Cisco SD-WAN Path Traversal Vulnerability - [Actively Exploited]
Description

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF

INFO

Published Date :

Sept. 30, 2022, 7:15 p.m.

Last Modified :

Feb. 26, 2026, 4:20 p.m.

Remotely Exploit :

No
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

Required Action :

Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

Known Ransomware Campaign Use:

Unknown

Notes :

CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-20775

Affected Products

The following products are affected by CVE-2022-20775 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Cisco sd-wan
2 Cisco catalyst_8500
3 Cisco catalyst_8510csr
4 Cisco catalyst_8510msr
5 Cisco catalyst_8540csr
6 Cisco catalyst_8540msr
7 Cisco catalyst_sd-wan_manager
8 Cisco sd-wan_vbond_orchestrator
9 Cisco asr_1001
10 Cisco asr_1002
11 Cisco asr_1002-x
12 Cisco asr_1004
13 Cisco asr_1006
14 Cisco asr_1013
15 Cisco sd-wan_vsmart_controller
16 Cisco sd-wan_solution
17 Cisco sd-wan_vedge_cloud
18 Cisco sd-wan_vedge_router
19 Cisco 8201
20 Cisco 8202
21 Cisco 1100-4g_integrated_services_router
22 Cisco 1100-4p_integrated_services_router
23 Cisco 1100-6g_integrated_services_router
24 Cisco 1100-8p_integrated_services_router
25 Cisco 1100_integrated_services_router
26 Cisco 1101-4p_integrated_services_router
27 Cisco 1101_integrated_services_router
28 Cisco 1109-2p_integrated_services_router
29 Cisco 1109-4p_integrated_services_router
30 Cisco 1109_integrated_services_router
31 Cisco 1111x-8p_integrated_services_router
32 Cisco 111x_integrated_services_router
33 Cisco 1120_integrated_services_router
34 Cisco 1131_integrated_services_router
35 Cisco 1160_integrated_services_router
36 Cisco 4000_integrated_services_router
37 Cisco 4221_integrated_services_router
38 Cisco 8101-32fh
39 Cisco 8101-32h
40 Cisco 8102-64h
41 Cisco 8201-32fh
42 Cisco 8804
43 Cisco 8808
44 Cisco 8812
45 Cisco 8818
46 Cisco asr_1000
47 Cisco asr_1001-hx
48 Cisco asr_1001-hx_r
49 Cisco asr_1001-x
50 Cisco asr_1001-x_r
51 Cisco asr_1002-hx
52 Cisco asr_1002-hx_r
53 Cisco asr_1002-x_r
54 Cisco asr_1006-x
55 Cisco asr_1009-x
56 Cisco asr_1023
57 Cisco catalyst_8200
58 Cisco catalyst_8300
59 Cisco catalyst_8300-1n1s-4t2x
60 Cisco catalyst_8300-1n1s-6t
61 Cisco catalyst_8300-2n2s-4t2x
62 Cisco catalyst_8300-2n2s-6t
63 Cisco catalyst_8500-4qc
64 Cisco catalyst_8500l
65 Cisco 1111x_integrated_services_router
66 Cisco 4321\/k9-rf_integrated_services_router
67 Cisco 4321\/k9-ws_integrated_services_router
68 Cisco 4321\/k9_integrated_services_router
69 Cisco 4321_integrated_services_router
70 Cisco 4331\/k9-rf_integrated_services_router
71 Cisco 4331\/k9-ws_integrated_services_router
72 Cisco 4331\/k9_integrated_services_router
73 Cisco 4331_integrated_services_router
74 Cisco 4351\/k9-rf_integrated_services_router
75 Cisco 4351\/k9-ws_integrated_services_router
76 Cisco 4351\/k9_integrated_services_router
77 Cisco 4351_integrated_services_router
78 Cisco 4431_integrated_services_router
79 Cisco 4451-x_integrated_services_router
80 Cisco 4451_integrated_services_router
81 Cisco 4461_integrated_services_router
82 Cisco asr_1000-x
83 Cisco 8831
84 Cisco catalyst_8000v_edge
85 Cisco catalyst_cg418-e
86 Cisco catalyst_cg522-e
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
CVSS 3.1 HIGH [email protected]
Solution
This information is provided by the 3rd party feeds.
  • Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwa52793, CSCwb54198
Public PoC/Exploit Available at Github

CVE-2022-20775 has a 5 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-20775.

URL Resource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc Exploit Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc Exploit Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775 US Government Resource
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-20775 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Rust Python

Updated: 2 weeks, 1 day ago
0 stars 0 fork 0 watcher
Born at : March 1, 2026, 3:54 p.m. This repo has been linked 3 different CVEs too.

None

Shell

Updated: 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 27, 2026, 2:27 p.m. This repo has been linked 4 different CVEs too.

BlueFalconInk CISA ED 26-03 Compliance Tracker - Rapid-response Streamlit app for Cisco SD-WAN vulnerability mitigation (CVE-2026-20127, CVE-2022-20775)

Dockerfile Python

Updated: 2 weeks, 1 day ago
0 stars 0 fork 0 watcher
Born at : Feb. 27, 2026, 12:26 a.m. This repo has been linked 2 different CVEs too.

None

Updated: 2 weeks, 1 day ago
5 stars 0 fork 0 watcher
Born at : Feb. 26, 2026, 3:49 p.m. This repo has been linked 2 different CVEs too.

test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC

cve-2020-

Updated: 1 year, 2 months ago
5 stars 3 fork 3 watcher
Born at : Jan. 21, 2022, 5:07 a.m. This repo has been linked 2650 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-20775 vulnerability anywhere in the article.

  • The Register
Cisco warns of two more SD-WAN bugs under active attack

Just when network admins thought the Cisco SD-WAN patch queue might finally be shrinking, Switchzilla has confirmed miscreants are exploiting more vulnerabilities in its SD-WAN management software. Th ... Read more

Published Date: Mar 06, 2026 (1 week, 3 days ago)
  • CybersecurityNews
PoC Exploit Released Cisco SD-WAN 0-Day Vulnerability Exploited in the Wild

PoC Exploit Released Cisco SD-WAN 0-Day Vulnerability A public proof-of-concept (PoC) exploit has been released for CVE-2026-20127, a maximum-severity zero-day vulnerability in Cisco Catalyst SD-WAN C ... Read more

Published Date: Mar 06, 2026 (1 week, 3 days ago)
  • Daily CyberSecurity
Weaponized in the Wild: Public PoC Exploit Disclosed for Critical 10.0 Cisco SD-WAN Flaw

The cybersecurity landscape has shifted into high gear following the public disclosure of a critical authentication bypass in Cisco Catalyst SD-WAN. The vulnerability, tracked as CVE-2026-20127, carri ... Read more

Published Date: Mar 05, 2026 (1 week, 4 days ago)
  • SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 9

The Good | Authorities Arrest Hacktivist & Convict L3Harris Insider for Selling Secrets to Russia Spanish authorities have arrested four suspected members of “Anonymous Fénix”, a hacktivist group accu ... Read more

Published Date: Feb 27, 2026 (2 weeks, 3 days ago)
  • The Cyber Express
The Cyber Express Weekly Roundup: Space Security, Malware & Regulatory Alerts

In this week’s edition of The Cyber Express weekly roundup, some interesting news and cybersecurity stories share an interesting shift in the cyber domain. Critical developments span space cybersecuri ... Read more

Published Date: Feb 27, 2026 (2 weeks, 3 days ago)
  • The Register
Five Eyes warn: Patch your Cisco SD-WAN or risk root takeover

The Five Eyes intelligence alliance is urgently warning defenders to patch two Cisco Catalyst SD-WAN vulnerabilities used in attacks. First discovered by the Australian Signals Directorate (ASD), all ... Read more

Published Date: Feb 26, 2026 (2 weeks, 4 days ago)
  • The Cyber Express
Hackers Exploited Cisco SD-WAN Zero-Day for Three Years Before Detection

Cisco Talos disclosed that a highly sophisticated threat actor exploited a critical authentication bypass vulnerability in Cisco SD-WAN infrastructure for at least three years before security research ... Read more

Published Date: Feb 26, 2026 (2 weeks, 4 days ago)
  • The Hacker News
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as ... Read more

Published Date: Feb 26, 2026 (2 weeks, 4 days ago)
  • Daily CyberSecurity
The Three-Year Shadow: Critical CVSS 10 Cisco SD-WAN Zero-Day Exploited by UAT-8616

Cisco Talos has issued a high-alert warning regarding the active exploitation of CVE-2026-20127, a critical vulnerability affecting the Cisco Catalyst SD-WAN Controller. This CVSS 10 vulnerability all ... Read more

Published Date: Feb 26, 2026 (2 weeks, 4 days ago)
  • CybersecurityNews
Critical Cisco SD-WAN 0-Day Vulnerability Exploited Since 2023 to Gain Root Access

Cisco SD-WAN 0-Day Vulnerability Cisco has disclosed a critical zero-day vulnerability in its Catalyst SD-WAN products that threat actors have exploited since 2023 to bypass authentication and achieve ... Read more

Published Date: Feb 26, 2026 (2 weeks, 4 days ago)
  • Help Net Security
Threat actor leveraged Cisco SD-WAN zero-day since 2023 (CVE-2026-20127)

A “highly sophisticated” cyber threat actor has been exploiting a zero-day authentication bypass vulnerability (CVE-2026-20127) in Cisco Catalyst SD-WAN Controller (formerly vSmart), Cisco has announc ... Read more

Published Date: Feb 25, 2026 (2 weeks, 5 days ago)

The following table lists the changes that have been made to the CVE-2022-20775 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Feb. 26, 2026

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* versions from (including) 20.6 up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* versions from (including) 20.6 up to (excluding) 20.6.3 *cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* versions from (including) 20.6 up to (excluding) 20.6.3 OR *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* versions up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* versions up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* versions up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:* versions up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan_vedge_cloud:20.8:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* versions from (including) 20.6 up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:* OR cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321/k9-ws_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331/k9-ws_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351/k9-ws_integrated_services_router:-:*:*:*:*:*:*:* AND OR *cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* versions up to (excluding) 20.6.3 OR cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321/k9-ws_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331/k9-ws_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
    Added Reference https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Added Reference Type NIST: https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc Types: Exploit, Third Party Advisory
    Added Reference Type NIST: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
    Added Reference Type NIST: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
    Added Reference Type NIST: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
    Added Reference Type NIST: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
    Added Reference Type Cisco Systems, Inc.: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
    Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775 Types: US Government Resource
  • CVE Modified by [email protected]

    Feb. 25, 2026

    Action Type Old Value New Value
    Changed Description Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Added Reference https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Removed Reference https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc
    Removed Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Removed Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Removed Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Removed Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Removed Reference Type https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc Types: Exploit, Third Party Advisory
    Removed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
    Removed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
    Removed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
    Removed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Types: Vendor Advisory
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Feb. 25, 2026

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Removed CVSS V3 Cisco Systems, Inc. AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CVSS V3.1 Cisco Systems, Inc. AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CPE Deprecation Remap by [email protected]

    Oct. 16, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:* versions from (including) 20.7 from (excluding) 20.7.2 OR *cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* versions from (including) 20.7 from (excluding) 20.7.2
  • CPE Deprecation Remap by [email protected]

    Oct. 16, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:* versions from (including) 20.6 from (excluding) 20.6.3 OR *cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* versions from (including) 20.6 from (excluding) 20.6.3
  • CPE Deprecation Remap by [email protected]

    Oct. 16, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:* OR *cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4331/k9:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4331/k9_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4331/k9-rf:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4331/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4351/k9-rf:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4351/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4351/k9-ws:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4351/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4331/k9-ws:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4331/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4351/k9:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4351/k9_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4321/k9-ws:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4321/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4321/k9-rf:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4321/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 23, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr4321/k9:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4321/k9_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4461:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1100:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4451-x:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4451:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1100-4g:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1100-6g:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1131:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4221:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4331:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4000:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4321:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4351:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1111x-8p:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1100-8p:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1100-4p:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1101-4p:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1109-4p:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_1109-2p:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 22, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:* OR *cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
  • Modified Analysis by [email protected]

    Nov. 10, 2022

    Action Type Old Value New Value
    Changed Reference Type https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc No Types Assigned https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc Exploit, Third Party Advisory
  • CVE Modified by [email protected]

    Oct. 11, 2022

    Action Type Old Value New Value
    Added Reference https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc [No Types Assigned]
  • Initial Analysis by [email protected]

    Oct. 04, 2022

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
    Added CWE NIST CWE-22
    Added CPE Configuration OR *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* versions from (including) 20.6 up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:* versions from (including) 20.6 up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:* *cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* versions from (including) 20.6 up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* versions from (including) 20.6 up to (excluding) 20.6.3 *cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:* versions from (including) 20.7 up to (excluding) 20.7.2 *cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:* OR cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4321\/k9:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4321\/k9-rf:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4321\/k9-ws:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4331\/k9:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4331\/k9-rf:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4331\/k9-ws:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4351\/k9:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4351\/k9-rf:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4351\/k9-ws:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-4g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-4p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-6g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-8p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1101-4p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109-2p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109-4p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x-8p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1131:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4221:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4321:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4331:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4351:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4451:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4451-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4461:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.