{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T14:05:15.012","vulnerabilities":[{"cve":{"id":"CVE-2022-20822","sourceIdentifier":"psirt@cisco.com","published":"2022-10-26T15:15:14.607","lastModified":"2024-11-21T06:43:37.377","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read and delete files on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains certain character sequences to an affected system. A successful exploit could allow the attacker to read or delete specific files on the device that their configured administrative level should not have access to. Cisco plans to release software updates that address this vulnerability."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de administración basada en la web de Cisco Identity Services Engine (ISE) podría permitir a un atacante remoto autenticado leer y eliminar archivos en un dispositivo afectado. Esta vulnerabilidad es debido a que no son comprobadas suficientemente las entradas proporcionadas por el usuario. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada que contenga determinadas secuencias de caracteres a un sistema afectado. Una explotación con éxito podría permitir al atacante leer o eliminar archivos específicos en el dispositivo a los que su nivel administrativo configurado no debería tener acceso. Cisco planea publicar actualizaciones de software que aborden esta vulnerabilidad"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*","matchCriteriaId":"C4DB9726-532F-45CE-81FD-45F2F6C7CE51"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*","matchCriteriaId":"2E8F0066-0EC0-41FD-80BE-55C4ED5F6B0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*","matchCriteriaId":"5D1765DB-1BEF-4CE9-8B86-B91F709600EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*","matchCriteriaId":"36722B6C-64A5-4D00-94E1-442878C37A35"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}