{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T04:27:39.371","vulnerabilities":[{"cve":{"id":"CVE-2022-20962","sourceIdentifier":"psirt@cisco.com","published":"2022-11-04T18:15:11.460","lastModified":"2024-11-21T06:43:55.573","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Localdisk Management feature of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to make unauthorized changes to the file system of an affected device.\r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request with absolute path sequences. A successful exploit could allow the attacker to upload malicious files to arbitrary locations within the file system. Using this method, it is possible to access the underlying operating system and execute commands with system privileges."},{"lang":"es","value":"Una vulnerabilidad en la función de administración de discos locales de Cisco Identity Services Engine (ISE) podría permitir que un atacante remoto autenticado realice cambios no autorizados en el sistema de archivos de un dispositivo afectado. Esta vulnerabilidad se debe a una validación de entrada insuficiente. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada con secuencias de ruta absolutas. Un exploit exitoso podría permitir al atacante cargar archivos maliciosos en ubicaciones arbitrarias dentro del sistema de archivos. Con este método, es posible acceder al Sistema Operativo subyacente y ejecutar comandos con privilegios del sistema."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N","baseScore":3.8,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-37"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*","matchCriteriaId":"C4DB9726-532F-45CE-81FD-45F2F6C7CE51"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*","matchCriteriaId":"2E8F0066-0EC0-41FD-80BE-55C4ED5F6B0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*","matchCriteriaId":"5D1765DB-1BEF-4CE9-8B86-B91F709600EB"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-f6M7cs6r","source":"psirt@cisco.com"},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-f6M7cs6r","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}