CVE-2022-20798 (CNNVD-202206-1535)

CRITICAL
中文标题:
Cisco多款产品 授权问题漏洞
英文标题:
Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability
CVSS分数: 9.8
发布时间: 2022-06-15 17:55:27
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Email Security Appliance(ESA)和Cisco Secure Email都是美国思科(Cisco)公司的产品。Cisco Email Security Appliance是一个电子邮件安全设备。Cisco Secure Email是思科安全电子邮件(前身为电子邮件安全)为您的电子邮件提供最佳保护,使其免受网络威胁。 Cisco Email Security Appliance、Secure Email 和 Web Manager 存在授权问题漏洞,该漏洞源于受影响的设备使用轻型目录访问协议(LDAP)进行外部身份验证时身份验证检查不当。未经身份验证的远程攻击者利用该漏洞能够绕过身份验证并登录到受影响设备的 Web 管理界面。

英文描述:

A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.

CWE类型:
CWE-287
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Cisco Cisco Email Security Appliance (ESA) n/a - - cpe:2.3:a:cisco:cisco_email_security_appliance_(esa):n_a:*:*:*:*:*:*:*
cisco email_security_appliance * - - cpe:2.3:a:cisco:email_security_appliance:*:*:*:*:*:*:*:*
cisco email_security_appliance 7.1.5 - - cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*
cisco secure_email_and_web_manager * - - cpe:2.3:a:cisco:secure_email_and_web_manager:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20220615 Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability vendor-advisory
cve.org
访问
CVSS评分详情
3.1 (cna)
CRITICAL
9.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2022-06-15 17:55:27
修改时间:
2024-11-01 19:02:42
创建时间:
2025-11-11 15:37:15
更新时间:
2025-11-11 15:57:20
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2022-20798 2025-11-11 15:21:15 2025-11-11 07:37:15
NVD nvd_CVE-2022-20798 2025-11-11 14:58:19 2025-11-11 07:45:32
CNNVD cnnvd_CNNVD-202206-1535 2025-11-11 15:10:55 2025-11-11 07:57:20
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:57:20
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-202206-1535; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-202206-1535
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:45:32
affected_products_count: 1 → 4; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 4
  • data_sources: ['cve'] -> ['cve', 'nvd']