CVE-2022-20775

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
References
Link Resource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc Exploit Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc Exploit Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775 US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vedge_cloud:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:*
OR cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321\/k9_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331\/k9_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351\/k9_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*

History

26 Feb 2026, 16:20

Type Values Removed Values Added
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF - Vendor Advisory
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775 - US Government Resource
CPE cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vedge_cloud:20.8:*:*:*:*:*:*:*
First Time Cisco sd-wan Vedge Cloud

25 Feb 2026, 21:16

Type Values Removed Values Added
Summary (en) Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. (en) A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
References
  • () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF -

25 Feb 2026, 18:16

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775 -

21 Nov 2024, 06:43

Type Values Removed Values Added
References () https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc - Exploit, Third Party Advisory () https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc - Exploit, Third Party Advisory
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF - Vendor Advisory

16 Oct 2023, 16:35

Type Values Removed Values Added
First Time Cisco catalyst Sd-wan Manager
CPE cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:*

23 May 2023, 13:55

Type Values Removed Values Added
CPE cpe:2.3:h:cisco:isr4351\/k9-ws:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr4321\/k9-rf:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr4321\/k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr4321\/k9-ws:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr4331\/k9-ws:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr4351\/k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr4331\/k9-rf:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr4351\/k9-rf:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr4331\/k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321\/k9_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351\/k9_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331\/k9_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
First Time Cisco 4351\/k9-ws Integrated Services Router
Cisco 4351\/k9 Integrated Services Router
Cisco 4351\/k9-rf Integrated Services Router
Cisco 4331\/k9 Integrated Services Router
Cisco 4321\/k9-rf Integrated Services Router
Cisco 4331\/k9-ws Integrated Services Router
Cisco 4321\/k9-ws Integrated Services Router
Cisco 4331\/k9-rf Integrated Services Router
Cisco 4321\/k9 Integrated Services Router

22 May 2023, 18:57

Type Values Removed Values Added
First Time Cisco 1100-4p Integrated Services Router
Cisco 4351 Integrated Services Router
Cisco 1109 Integrated Services Router
Cisco 1100-6g Integrated Services Router
Cisco 1160 Integrated Services Router
Cisco 1101 Integrated Services Router
Cisco 4221 Integrated Services Router
Cisco 4431 Integrated Services Router
Cisco 1111x Integrated Services Router
Cisco 1120 Integrated Services Router
Cisco 4451 Integrated Services Router
Cisco 4331 Integrated Services Router
Cisco 1101-4p Integrated Services Router
Cisco 1111x-8p Integrated Services Router
Cisco 4461 Integrated Services Router
Cisco 4321 Integrated Services Router
Cisco 1100-8p Integrated Services Router
Cisco 4451-x Integrated Services Router
Cisco 1100 Integrated Services Router
Cisco 4000 Integrated Services Router
Cisco 1109-4p Integrated Services Router
Cisco 1109-2p Integrated Services Router
Cisco 1131 Integrated Services Router
Cisco 1100-4g Integrated Services Router
Cisco 111x Integrated Services Router
CPE cpe:2.3:h:cisco:isr_1100-8p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1109-4p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4221:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1100-6g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1109-2p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4461:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4351:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1100-4p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4331:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4451:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1101-4p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4451-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1100-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1131:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1111x-8p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1100:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4321:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*

Information

Published : 2022-09-30 19:15

Updated : 2026-02-26 16:20


NVD link : CVE-2022-20775

Mitre link : CVE-2022-20775

CVE.ORG link : CVE-2022-20775


JSON object : View

Products Affected

cisco

  • sd-wan_vsmart_controller
  • 1100-8p_integrated_services_router
  • asr_1009-x
  • catalyst_8300-1n1s-6t
  • catalyst_8300-2n2s-6t
  • 4321_integrated_services_router
  • 4351\/k9-ws_integrated_services_router
  • 8831
  • 4351\/k9-rf_integrated_services_router
  • 4451-x_integrated_services_router
  • asr_1004
  • asr_1002-hx_r
  • asr_1000-x
  • catalyst_8500-4qc
  • asr_1023
  • 8812
  • 4351\/k9_integrated_services_router
  • 1120_integrated_services_router
  • asr_1001-x
  • 1101_integrated_services_router
  • asr_1001-x_r
  • 4321\/k9_integrated_services_router
  • catalyst_8510csr
  • catalyst_cg418-e
  • 4000_integrated_services_router
  • 8808
  • asr_1006-x
  • catalyst_8200
  • 8101-32h
  • 1100-4g_integrated_services_router
  • 4451_integrated_services_router
  • 8201-32fh
  • catalyst_8500
  • 1100-4p_integrated_services_router
  • asr_1001
  • 4331\/k9-ws_integrated_services_router
  • 8101-32fh
  • catalyst_8540msr
  • sd-wan_vbond_orchestrator
  • 4321\/k9-rf_integrated_services_router
  • 1109-4p_integrated_services_router
  • 8818
  • 4461_integrated_services_router
  • catalyst_8000v_edge
  • 8201
  • 1101-4p_integrated_services_router
  • 1111x_integrated_services_router
  • sd-wan
  • asr_1002-x_r
  • 4221_integrated_services_router
  • 1109_integrated_services_router
  • asr_1013
  • 1111x-8p_integrated_services_router
  • 8202
  • asr_1001-hx_r
  • 4351_integrated_services_router
  • 8102-64h
  • 4331_integrated_services_router
  • catalyst_8300
  • catalyst_cg522-e
  • 4321\/k9-ws_integrated_services_router
  • sd-wan_vedge_cloud
  • 4331\/k9_integrated_services_router
  • asr_1002-x
  • catalyst_8300-2n2s-4t2x
  • catalyst_8510msr
  • 1109-2p_integrated_services_router
  • 4331\/k9-rf_integrated_services_router
  • 1160_integrated_services_router
  • asr_1002
  • catalyst_8500l
  • asr_1000
  • asr_1002-hx
  • asr_1001-hx
  • 111x_integrated_services_router
  • catalyst_8540csr
  • 1100_integrated_services_router
  • asr_1006
  • 4431_integrated_services_router
  • 1100-6g_integrated_services_router
  • catalyst_8300-1n1s-4t2x
  • 1131_integrated_services_router
  • 8804
  • catalyst_sd-wan_manager
CWE
CWE-25

Path Traversal: '/../filedir'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')