Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-20798


A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.


Published

2022-06-15T18:15:08.927

Last Modified

2024-11-21T06:43:34.657

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-287
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco email_security_appliance < 14.0.1-033 Yes
Application cisco email_security_appliance 7.1.5 Yes
Application cisco secure_email_and_web_manager < 13.0.0-277 Yes
Application cisco secure_email_and_web_manager < 13.6.2-090 Yes
Application cisco secure_email_and_web_manager < 13.8.1-090 Yes
Application cisco secure_email_and_web_manager < 14.0.0-418 Yes
Application cisco secure_email_and_web_manager < 14.1.0-250 Yes

References