Cisco Security Advisories

Cisco Webex Meetings Web Interface Vulnerabilities

Wed, 2022-08-03 23:00
<p>Multiple vulnerabilities in the web interface of Cisco&nbsp;Webex Meetings could allow a remote attacker to conduct a cross-site scripting (XSS) attack or a frame hijacking attack against a user of the web interface.</p> <p>For more information about these vulnerabilities, see the <a href="#details">Details</a> section of this advisory.</p> <p>Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p> <p>This advisory is available at the following link:<br><a id="u_psirt_publication.u_public_url_link" class="web web-inline form-control-static" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-frmhijck-kO3wmkuS" target="gsft_link" name="u_psirt_publication.u_public_url_link">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-frmhijck-kO3wmkuS</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20820,CVE-2022-20852
Categories: Security Alerts

Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability

Wed, 2022-08-03 23:00
<p>A vulnerability in the External RESTful Services (ERS) API of Cisco&nbsp;Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to obtain sensitive information.</p> <p>This vulnerability is due to excessive verbosity in a specific REST API output. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain sensitive information, including administrative credentials for an external authentication server.</p> <p><strong>Note: </strong>To successfully exploit this vulnerability, the attacker must have valid ERS administrative credentials.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a id="u_psirt_publication.u_public_url_link" class="web web-inline form-control-static" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-pwd-WH64AhQF" target="gsft_link" name="u_psirt_publication.u_public_url_link">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-pwd-WH64AhQF</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20914
Categories: Security Alerts

Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability

Wed, 2022-08-03 23:00
<p>A vulnerability in the web-based management interface of Cisco&nbsp;BroadWorks Application Delivery Platform Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.</p> <p>This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-xbhfr4cD">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-xbhfr4cD</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20869
Categories: Security Alerts

Cisco Small Business RV Series Routers Vulnerabilities

Wed, 2022-08-03 23:00
<p>Multiple vulnerabilities in Cisco&nbsp;Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device.</p> <p>For more information about these vulnerabilities, see the&nbsp;<a href="#ds">Details</a>&nbsp;section of this advisory.</p> <p>Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR</a></p>
Security Impact Rating: Critical
CVE: CVE-2022-20827,CVE-2022-20841,CVE-2022-20842
Categories: Security Alerts

Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability

Wed, 2022-08-03 23:00
<p>A vulnerability in the web-based management interface of Cisco&nbsp;Unified Communications Manager (Unified CM) and Cisco&nbsp;Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to delete arbitrary files from an affected system.</p> <p>This vulnerability exists because the affected software does not properly validate HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to delete arbitrary files from the affected system.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20816
Categories: Security Alerts

Cisco IoT Control Center Cross-Site Scripting Vulnerability

Wed, 2022-07-20 23:00
<p>A vulnerability in the web-based management interface of Cisco&nbsp;IoT Control Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.</p> <p>This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iotcc-xss-WQrCLRVd">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iotcc-xss-WQrCLRVd</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20916
Categories: Security Alerts

Cisco Nexus Dashboard Privilege Escalation Vulnerabilities

Wed, 2022-07-20 23:00
<p>Multiple vulnerabilities in Cisco&nbsp;Nexus Dashboard could allow an authenticated, local attacker to elevate privileges on an affected device.</p> <p>These vulnerabilities are due to insufficient input validation during CLI command execution on an affected device. An attacker could exploit these vulnerabilities by authenticating as the rescue-user and executing vulnerable CLI commands using a malicious payload. A successful exploit could allow the attacker to elevate privileges to <em>root </em>on an affected device.</p> <p>Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20906,CVE-2022-20907,CVE-2022-20908,CVE-2022-20909
Categories: Security Alerts

Cisco Nexus Dashboard Unauthorized Access Vulnerabilities

Wed, 2022-07-20 23:00
<p>Multiple vulnerabilities in Cisco&nbsp;Nexus Dashboard could allow an unauthenticated, remote attacker to execute arbitrary commands, read or upload container image files, or perform a cross-site request forgery attack.</p> <p>For more information about these vulnerabilities, see the <a href="#details">Details</a> section of this advisory.</p> <p>Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mhcvuln-vpsBPJ9y">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mhcvuln-vpsBPJ9y</a></p>
Security Impact Rating: Critical
CVE: CVE-2022-20857,CVE-2022-20858,CVE-2022-20861
Categories: Security Alerts

Cisco Nexus Dashboard Arbitrary File Write Vulnerability

Wed, 2022-07-20 23:00
<p>A vulnerability in Cisco&nbsp;Nexus Dashboard could allow an authenticated, remote attacker to write arbitrary files on an affected device.</p> <p>This vulnerability is due to insufficient input validation in the web-based management interface of Cisco&nbsp;Nexus Dashboard. An attacker with <em>Administrator </em>credentials could exploit this vulnerability by uploading a crafted file. A successful exploit could allow the attacker to overwrite arbitrary files on an affected device.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-afw-2MT9tb99">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-afw-2MT9tb99</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20913
Categories: Security Alerts

Cisco Nexus Dashboard SSL Certificate Validation Vulnerability

Wed, 2022-07-20 23:00
<p>A vulnerability in the SSL/TLS implementation of Cisco&nbsp;Nexus Dashboard could allow an unauthenticated, remote attacker to alter communications with associated controllers or view sensitive information.</p> <p>This vulnerability exists because SSL server certificates are not validated when Cisco&nbsp;Nexus Dashboard is establishing a connection to Cisco&nbsp;Application Policy Infrastructure Controller (APIC), Cisco&nbsp;Cloud APIC, or Cisco&nbsp;Nexus Dashboard Fabric Controller, formerly Data Center Network Manager (DCNM) controllers.&nbsp;An attacker could exploit this vulnerability by using man-in-the-middle techniques to intercept the traffic between the affected device and the controllers, and then using a crafted certificate to impersonate the controllers. A successful exploit could allow the attacker to alter communications between devices or view sensitive information, including&nbsp;<em>Administrator</em> credentials for these controllers.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-tlsvld-TbAQLp3N" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-tlsvld-TbAQLp3N</a></p>
Security Impact Rating: High
CVE: CVE-2022-20860
Categories: Security Alerts

Cisco Identity Services Engine Administrator Password Lifetime Expiration Issue

Wed, 2022-07-20 23:00
<p>An issue in the Password Policy settings of Cisco&nbsp;Identity Services Engine (ISE) could allow an administrator to use expired credentials to gain access to the web management interface.</p> <p>When the Password Lifetime<strong> </strong>setting for the administrator password policy is used to set the password to expire, the password does not expire. As a result, an administrator could use expired credentials to log in to the web management interface and have the same level of privileges as before the password expired. No additional privileges would be gained, and valid credentials would be required.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-lifetime-pwd-GpCs76mb" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-lifetime-pwd-GpCs76mb</a></p>
Security Impact Rating: Informational
Categories: Security Alerts

Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities

Wed, 2022-07-20 16:00
<p>Multiple vulnerabilities in the web-based management interface of Cisco&nbsp;Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition.</p> <p>These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with <em>root</em>-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid <em>Administrator</em>&nbsp;credentials on the affected device.</p> <p>Cisco&nbsp;has not released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK" rel="nofollow">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20873,CVE-2022-20874,CVE-2022-20875,CVE-2022-20876,CVE-2022-20877,CVE-2022-20878,CVE-2022-20879,CVE-2022-20880,CVE-2022-20881,CVE-2022-20882,CVE-2022-20883,CVE-2022-20884,CVE-2022-20885,CVE-2022-20886,CVE-2022-20887,CVE-2022-20888,CVE-2022-20889,CVE-2022-20890,CVE-2022-20891,CVE-2022-20892,CVE-2022-20893,CVE-2022-20894,CVE-2022-20895,CVE-2022-20896,CVE-2022-20897,CVE-2022-20898,CVE-2022-20899,CVE-2022-20900,CVE-2022-20901,CVE-2022-20902,CVE-2022-20903,CVE-2022-20904,CVE-2022-20910,CVE-2022-20911,CVE-2022-20912
Categories: Security Alerts

Cisco Unified Communications Products Arbitrary File Read Vulnerability

Wed, 2022-07-06 16:00
<p>A vulnerability in the database user privileges of Cisco&nbsp;Unified Communications Manager (Unified CM), Cisco&nbsp;Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco&nbsp;Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device.</p> <p>This vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the API to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20791
Categories: Security Alerts

Cisco Unified Communications Products Timing Attack Vulnerability

Wed, 2022-07-06 16:00
<p>A vulnerability in Cisco&nbsp;Unified Communications Manager (Unified CM), Cisco&nbsp;Unified Communications Manager Session Management Edition (Unified CM SME), and <span class="more">Cisco&nbsp;Unity Connection</span> could allow an unauthenticated, remote attacker to perform a timing attack.</p> <p>This vulnerability is due to insufficient protection of a system password. An attacker could exploit this vulnerability by observing the time it takes the system to respond to various queries. A successful exploit could allow the attacker to determine a sensitive system password.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-timing-JVbHECOK">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-timing-JVbHECOK</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20752
Categories: Security Alerts

Cisco Unified Communications Manager Arbitrary File Read Vulnerability

Wed, 2022-07-06 16:00
<p>A vulnerability in the web-based management interface of Cisco&nbsp;Unified Communications Manager (Unified CM) and Cisco&nbsp;Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device.</p> <p>This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the operating system.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-file-read-qgjhEc3A">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-file-read-qgjhEc3A</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20862
Categories: Security Alerts

Cisco Unified Communications Products Access Control Vulnerability

Wed, 2022-07-06 16:00
<p>A vulnerability in the Disaster Recovery framework of Cisco&nbsp;Unified Communications Manager (Unified CM), Cisco&nbsp;Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), and <span class="more">Cisco&nbsp;Unity Connection</span> could allow an authenticated, remote attacker to perform certain administrative actions they should not be able to.</p> <p>This vulnerability is due to insufficient access control checks on the affected device. An attacker with <em>read-only</em> privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to perform a set of administrative actions they should not be able to.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-access-dMKvV2DY" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-access-dMKvV2DY</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20859
Categories: Security Alerts

Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability

Wed, 2022-07-06 16:00
<p>A vulnerability in the logging component of Cisco&nbsp;TelePresence Collaboration Endpoint (CE) and RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system.</p> <p>This vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII).</p> <p><strong>Note:</strong> To access the logs that are stored in the RoomOS Cloud, an attacker would need valid <em>Administrator</em>-level credentials.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-infodisc-YOTz9Ct7">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-infodisc-YOTz9Ct7</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20768
Categories: Security Alerts

Cisco Smart Software Manager On-Prem Denial of Service Vulnerability

Wed, 2022-07-06 16:00
<p>A vulnerability in Cisco&nbsp;Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.</p> <p>This vulnerability is due to incorrect handling of multiple simultaneous device registrations on Cisco&nbsp;SSM On-Prem. An attacker could exploit this vulnerability by sending multiple device registration requests to Cisco&nbsp;SSM On-Prem. A successful exploit could allow the attacker to cause a&nbsp;DoS condition on an affected device.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-privesc-tP6uNZOS" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-privesc-tP6uNZOS</a></p>
Security Impact Rating: High
CVE: CVE-2022-20808
Categories: Security Alerts

Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities

Wed, 2022-07-06 16:00
<p>Multiple vulnerabilities in the API and in the web-based management interface of Cisco&nbsp;Expressway Series and Cisco&nbsp;TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device.</p> <p><strong>Note:</strong> Cisco&nbsp;Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device.</p> <p>For more information about these vulnerabilities, see the <a href="#details">Details</a> section of this advisory.</p> <p>Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-overwrite-3buqW8LH">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-overwrite-3buqW8LH</a></p>
Security Impact Rating: Critical
CVE: CVE-2022-20812,CVE-2022-20813
Categories: Security Alerts

Cisco Unified Communications Products Cross-Site Scripting Vulnerability

Wed, 2022-07-06 16:00
<p>A vulnerability in the web-based management interface of Cisco&nbsp;Unified Communications Manager (Unified CM), Cisco&nbsp;Unified CM Session Management Edition (Unified CM SME), and Cisco&nbsp;Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.</p> <p>This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.</p> <p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p> <p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-ksKd5yfA">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-ksKd5yfA</a></p>
Security Impact Rating: Medium
CVE: CVE-2022-20815
Categories: Security Alerts

Pages