CVE-2022-20680

A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper enforcement of Administrator privilege levels for low-value sensitive data. An attacker with read-only Administrator access to the web-based management interface could exploit this vulnerability by sending a malicious HTTP request to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information about users of the system and orders that have been placed using the application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:-:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch10:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch11:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch12:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch13:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch14:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch15:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch16:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch17:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch3:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch6:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch7:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch8:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch9:*:*:*:*:*:*

History

24 Jul 2023, 13:50

Type Values Removed Values Added
CWE CWE-269 NVD-CWE-Other

17 Feb 2022, 20:38

Type Values Removed Values Added
CWE CWE-269
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpsc-info-disc-zkJBDJ9F - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpsc-info-disc-zkJBDJ9F - Vendor Advisory
CPE cpe:2.3:a:cisco:prime_service_catalog:12.1:patch3:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:-:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch8:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch14:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch12:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch16:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch7:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch15:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch9:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch10:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch11:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch17:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch6:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:patch13:*:*:*:*:*:*

10 Feb 2022, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-10 18:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-20680

Mitre link : CVE-2022-20680

CVE.ORG link : CVE-2022-20680


JSON object : View

Products Affected

cisco

  • prime_service_catalog
CWE
NVD-CWE-Other CWE-200

Exposure of Sensitive Information to an Unauthorized Actor