{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T01:30:48.992","vulnerabilities":[{"cve":{"id":"CVE-2022-20676","sourceIdentifier":"psirt@cisco.com","published":"2022-04-15T15:15:12.353","lastModified":"2024-11-21T06:43:17.770","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root-level privileges. This vulnerability is due to insufficient input validation of data that is passed into the Tcl interpreter. An attacker could exploit this vulnerability by loading malicious Tcl code on an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root. By default, Tcl shell access requires privilege level 15."},{"lang":"es","value":"Una vulnerabilidad en el intérprete de Tool Command Language (Tcl) del software Cisco IOS XE podría permitir a un atacante local autenticado escalar desde el nivel de privilegio 15 a privilegios de nivel root. Esta vulnerabilidad es debido a que no ha sido suficientemente la entrada de datos que son pasados al intérprete Tcl. Un atacante podría explotar esta vulnerabilidad cargando código Tcl malicioso en un dispositivo afectado. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios como root. Por defecto, el acceso al shell Tcl requiere un nivel de privilegio 15"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-250"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*","matchCriteriaId":"46E37204-FC9A-4397-AFA4-9CAC7A116D55"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*","matchCriteriaId":"4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*","matchCriteriaId":"B51FA707-8DB1-4596-9122-D4BFEF17F400"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*","matchCriteriaId":"C04DF35A-1B6F-420A-8D84-74EB41BF3700"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*","matchCriteriaId":"211CC9B2-6108-4C50-AB31-DC527C43053E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*","matchCriteriaId":"75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*","matchCriteriaId":"08DCCBA3-82D2-4444-B5D3-E5FC58D024F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*","matchCriteriaId":"128F95D7-E49F-4B36-8F47-823C0298449E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*","matchCriteriaId":"E21B3881-37E9-4C00-9336-12C9C28D1B61"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*","matchCriteriaId":"E54599DB-A85E-4EEA-9985-2CBF90E28A08"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*","matchCriteriaId":"4046C325-7EDB-4C95-AA98-541BEC8F9E0F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*","matchCriteriaId":"E5B70A3D-CBE1-4218-A7B4-F85741A57BD7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*","matchCriteriaId":"2B270A04-9961-4E99-806B-441CD674AFBD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*","matchCriteriaId":"1360069D-0358-4746-8C3F-44C2A40988D7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*","matchCriteriaId":"C5DD2403-113B-4100-8BD4-90E1927E6648"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*","matchCriteriaId":"A35FFA44-9A59-4C20-9D86-C40B68BD5F77"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*","matchCriteriaId":"DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*","matchCriteriaId":"2DDB1E60-C2A9-4570-BE80-F3D478A53738"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*","matchCriteriaId":"9841799A-87E2-46AE-807A-824981EAB35A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*","matchCriteriaId":"0CEF022B-271F-4017-B74B-82748D5EBA01"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*","matchCriteriaId":"5A6B707B-4543-41F1-83DF-49A93BF56FB1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*","matchCriteriaId":"DC8F611B-D347-4A21-90E6-56CF4D8A35A3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*","matchCriteriaId":"D9A92CE4-B4B0-4C14-AE11-8DFE511406F3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*","matchCriteriaId":"298C82F9-79A6-4DB7-8432-8B3A6DA39620"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*","matchCriteriaId":"274E3E6F-4280-4EAE-B102-1BE57FE1F1D2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*","matchCriteriaId":"46B52A51-51DB-4A12-AB1D-8D9605226599"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*","matchCriteriaId":"938B0720-8CA7-43BA-9708-5CE9EC7A565A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*","matchCriteriaId":"D4BE7166-DBD3-4CE6-A14A-725FE896B85E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.5.1c:*:*:*:*:*:*:*","matchCriteriaId":"BDEDC7A0-D031-433B-ABF5-4EC0A43D80CC"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-grbtubU","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-grbtubU","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}