CVE-2022-20773

A vulnerability in the key-based SSH authentication mechanism of Cisco Umbrella Virtual Appliance (VA) could allow an unauthenticated, remote attacker to impersonate a VA. This vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a man-in-the-middle attack on an SSH connection to the Umbrella VA. A successful exploit could allow the attacker to learn the administrator credentials, change configurations, or reload the VA. Note: SSH is not enabled by default on the Umbrella VA.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:umbrella:*:*:*:*:*:*:*:*

History

04 May 2022, 18:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.1
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uva-static-key-6RQTRs4c - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uva-static-key-6RQTRs4c - Vendor Advisory
First Time Cisco umbrella
Cisco
CWE CWE-798
CPE cpe:2.3:a:cisco:umbrella:*:*:*:*:*:*:*:*

21 Apr 2022, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-21 19:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-20773

Mitre link : CVE-2022-20773

CVE.ORG link : CVE-2022-20773


JSON object : View

Products Affected

cisco

  • umbrella
CWE
CWE-798

Use of Hard-coded Credentials

CWE-321

Use of Hard-coded Cryptographic Key