CVE-2022-20775Thursday, January 8, 2026

Cisco IOS XE Software Command Injection Vulnerability

A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. This vulnerability is due to insufficient validation of user-supplied input.

Not KEV Listed✓ Fix Available
Cisco IOS XE Software Command Injection Vulnerability
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

This security flaw affects Cisco network devices running IOS XE software. If someone has valid login credentials to the device, they could potentially run dangerous commands that they shouldn't be able to run, gaining complete control over the device.

The problem exists because the device doesn't properly check and validate commands that users type in. Think of it like a security guard who is supposed to check everyone's ID and authorization level, but sometimes just waves people through without checking. This could let someone with basic access do things that only administrators should be able to do.

Affected Products

1affected product identified
ProductVendorVersionPatched
>IOS XE SoftwareCisco16.1.1 through 17.6.317.6.4
🔧

Remediation

Fix Available

Upgrade affected devices to IOS XE version 17.6.4 or later. There are no workarounds that address this vulnerability. Ensure that local authentication and authorization mechanisms are properly configured to restrict user access.

CVSS Score
6.7
MediumCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2022-20775
Severitymedium
FixAvailable
KEVNot Listed
PublishedJan 8, 2026