Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation (cisco-sa-ewc-priv-esc-nderYLtK)

medium Nessus Plugin ID 165530

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco IOS-XE Software is affected by a vulnerability.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwa23357

See Also

http://www.nessus.org/u?26925ed0

https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74745

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa23357

Plugin Details

Severity: Medium

ID: 165530

File Name: cisco-sa-ewc-priv-esc-nderYLtK-iosxe.nasl

Version: 1.9

Type: combined

Family: CISCO

Published: 9/29/2022

Updated: 11/30/2022

Configuration: Enable paranoid mode

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2022-20855

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xe

Required KB Items: Host/Cisco/IOS-XE/Version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 9/28/2022

Vulnerability Publication Date: 9/28/2022

Reference Information

CVE: CVE-2022-20855

CISCO-BUG-ID: CSCwa23357

CISCO-SA: cisco-sa-ewc-priv-esc-nderYLtK

IAVA: 2022-A-0390

CWE: 266