Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature

cisco-sa-iosxe-webui-privesc-j22SaA4z · Critical · Published · Updated

Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Fix information can be found in the Fixed Software section of this advisory. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343. For steps to close the attack vector for these vulnerabilities, see the Recommendations section of this advisory. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address these vulnerabilities.

Disabling the HTTP Server feature eliminates the attack vector for these vulnerabilities and may be a suitable mitigation until affected devices can be upgraded. Administrators can disable the HTTP Server feature by using the no ip http server or no ip http secure-server command in global configuration mode. If both http server and http-secure server are in use, then both commands are required to disable the HTTP Server feature.

Limiting access to the HTTP Server to trusted networks will limit exposure to these vulnerabilities. The following example shows how to allow remote access to the HTTP Server from the trusted 192.168.0.0/24 network:

!
ip http access-class 75
ip http secure-server
!
access-list 75 permit 192.168.0.0 0.0.0.255
access-list 75 deny any
!

Note: To apply the access list in newer versions of Cisco IOS XE Software, use the ip http access-class ipv4 75 command for the previous example. See Filter Traffic Destined to Cisco IOS XE Devices WebUI Using an Access List ["https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-17/221107-filter-traffic-destined-to-cisco-ios-xe.html"] for additional information.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2023-20198, CVE-2023-20273
Cisco Bug IDsCSCwh87343
CVSS ScoreBase 10.0
Base 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:X/RL:X/RC:X
Base 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XE Software 16.1.1, Cisco IOS XE Software 16.1.2, Cisco IOS XE Software 16.1.3, Cisco IOS XE Software 16.2.1, Cisco IOS XE Software 16.2.2, Cisco IOS XE Software 16.3.1, Cisco IOS XE Software 16.3.2, Cisco IOS XE Software 16.3.3, Cisco IOS XE Software 16.3.1a, Cisco IOS XE Software 16.3.4, Cisco IOS XE Software 16.3.5, Cisco IOS XE Software 16.3.5b, Cisco IOS XE Software 16.3.6, Cisco IOS XE Software 16.3.7, Cisco IOS XE Software 16.3.8, Cisco IOS XE Software 16.3.9, Cisco IOS XE Software 16.3.10, Cisco IOS XE Software 16.3.11, Cisco IOS XE Software 16.4.1, Cisco IOS XE Software 16.4.2, Cisco IOS XE Software 16.4.3, Cisco IOS XE Software 16.5.1, Cisco IOS XE Software 16.5.1a, Cisco IOS XE Software 16.5.1b, Cisco IOS XE Software 16.5.2, Cisco IOS XE Software 16.5.3, Cisco IOS XE Software 16.6.1, Cisco IOS XE Software 16.6.2, Cisco IOS XE Software 16.6.3, Cisco IOS XE Software 16.6.4, Cisco IOS XE Software 16.6.5, Cisco IOS XE Software 16.6.4s, Cisco IOS XE Software 16.6.4a, Cisco IOS XE Software 16.6.5a, Cisco IOS XE Software 16.6.6, Cisco IOS XE Software 16.6.5b, Cisco IOS XE Software 16.6.7, Cisco IOS XE Software 16.6.7a, Cisco IOS XE Software 16.6.8, Cisco IOS XE Software 16.6.9, Cisco IOS XE Software 16.6.10, Cisco IOS XE Software 16.7.1, Cisco IOS XE Software 16.7.1a, Cisco IOS XE Software 16.7.1b, Cisco IOS XE Software 16.7.2, Cisco IOS XE Software 16.7.3, Cisco IOS XE Software 16.7.4, Cisco IOS XE Software 16.8.1, Cisco IOS XE Software 16.8.1a, Cisco IOS XE Software 16.8.1b, Cisco IOS XE Software 16.8.1s, Cisco IOS XE Software 16.8.1c, Cisco IOS XE Software 16.8.1d, Cisco IOS XE Software 16.8.2, Cisco IOS XE Software 16.8.1e, Cisco IOS XE Software 16.8.3, Cisco IOS XE Software 16.9.1, Cisco IOS XE Software 16.9.2, Cisco IOS XE Software 16.9.1a, Cisco IOS XE Software 16.9.1b, Cisco IOS XE Software 16.9.1s, Cisco IOS XE Software 16.9.1c, Cisco IOS XE Software 16.9.1d, Cisco IOS XE Software 16.9.3, Cisco IOS XE Software 16.9.2a, Cisco IOS XE Software 16.9.2s, Cisco IOS XE Software 16.9.3h, Cisco IOS XE Software 16.9.4, Cisco IOS XE Software 16.9.3s, Cisco IOS XE Software 16.9.3a, Cisco IOS XE Software 16.9.4c, Cisco IOS XE Software 16.9.5, Cisco IOS XE Software 16.9.5f, Cisco IOS XE Software 16.9.6, Cisco IOS XE Software 16.9.7, Cisco IOS XE Software 16.9.8, Cisco IOS XE Software 16.9.8a, Cisco IOS XE Software 16.9.8b, Cisco IOS XE Software 16.10.1, Cisco IOS XE Software 16.10.1a, Cisco IOS XE Software 16.10.1b, Cisco IOS XE Software 16.10.1s, Cisco IOS XE Software 16.10.1c, Cisco IOS XE Software 16.10.1e, Cisco IOS XE Software 16.10.1d, Cisco IOS XE Software 16.10.2, Cisco IOS XE Software 16.10.1f, Cisco IOS XE Software 16.10.1g, Cisco IOS XE Software 16.10.3, Cisco IOS XE Software 16.11.1, Cisco IOS XE Software 16.11.1a, Cisco IOS XE Software 16.11.1b, Cisco IOS XE Software 16.11.2, Cisco IOS XE Software 16.11.1s, Cisco IOS XE Software 16.11.1c, Cisco IOS XE Software 16.12.1, Cisco IOS XE Software 16.12.1s, Cisco IOS XE Software 16.12.1a, Cisco IOS XE Software 16.12.1c, Cisco IOS XE Software 16.12.1w, Cisco IOS XE Software 16.12.2, Cisco IOS XE Software 16.12.1y, Cisco IOS XE Software 16.12.2a, Cisco IOS XE Software 16.12.3, Cisco IOS XE Software 16.12.8, Cisco IOS XE Software 16.12.2s, Cisco IOS XE Software 16.12.1x, Cisco IOS XE Software 16.12.1t, Cisco IOS XE Software 16.12.2t, Cisco IOS XE Software 16.12.4, Cisco IOS XE Software 16.12.3s, Cisco IOS XE Software 16.12.1z, Cisco IOS XE Software 16.12.3a, Cisco IOS XE Software 16.12.4a, Cisco IOS XE Software 16.12.5, Cisco IOS XE Software 16.12.6, Cisco IOS XE Software 16.12.1z1, Cisco IOS XE Software 16.12.5a, Cisco IOS XE Software 16.12.5b, Cisco IOS XE Software 16.12.1z2, Cisco IOS XE Software 16.12.6a, Cisco IOS XE Software 16.12.7, Cisco IOS XE Software 16.12.9, Cisco IOS XE Software 16.12.10, Cisco IOS XE Software 17.1.1, Cisco IOS XE Software 17.1.1a, Cisco IOS XE Software 17.1.1s, Cisco IOS XE Software 17.1.2, Cisco IOS XE Software 17.1.1t, Cisco IOS XE Software 17.1.3, Cisco IOS XE Software 17.2.1, Cisco IOS XE Software 17.2.1r, Cisco IOS XE Software 17.2.1a, Cisco IOS XE Software 17.2.1v, Cisco IOS XE Software 17.2.2, Cisco IOS XE Software 17.2.3, Cisco IOS XE Software 17.3.1, Cisco IOS XE Software 17.3.2, Cisco IOS XE Software 17.3.3, Cisco IOS XE Software 17.3.1a, Cisco IOS XE Software 17.3.1w, Cisco IOS XE Software 17.3.2a, Cisco IOS XE Software 17.3.1x, Cisco IOS XE Software 17.3.1z, Cisco IOS XE Software 17.3.3a, Cisco IOS XE Software 17.3.4, Cisco IOS XE Software 17.3.5, Cisco IOS XE Software 17.3.4a, Cisco IOS XE Software 17.3.6, Cisco IOS XE Software 17.3.4b, Cisco IOS XE Software 17.3.4c, Cisco IOS XE Software 17.3.5a, Cisco IOS XE Software 17.3.5b, Cisco IOS XE Software 17.3.7, Cisco IOS XE Software 17.3.8, Cisco IOS XE Software 17.4.1, Cisco IOS XE Software 17.4.2, Cisco IOS XE Software 17.4.1a, Cisco IOS XE Software 17.4.1b, Cisco IOS XE Software 17.4.1c, Cisco IOS XE Software 17.4.2a, Cisco IOS XE Software 17.5.1, Cisco IOS XE Software 17.5.1a, Cisco IOS XE Software 17.5.1b, Cisco IOS XE Software 17.5.1c, Cisco IOS XE Software 17.6.1, Cisco IOS XE Software 17.6.2, Cisco IOS XE Software 17.6.1w, Cisco IOS XE Software 17.6.1a, Cisco IOS XE Software 17.6.1x, Cisco IOS XE Software 17.6.3, Cisco IOS XE Software 17.6.1y, Cisco IOS XE Software 17.6.1z, Cisco IOS XE Software 17.6.3a, Cisco IOS XE Software 17.6.4, Cisco IOS XE Software 17.6.1z1, Cisco IOS XE Software 17.6.5, Cisco IOS XE Software 17.6.6, Cisco IOS XE Software 17.7.1, Cisco IOS XE Software 17.7.1a, Cisco IOS XE Software 17.7.1b, Cisco IOS XE Software 17.7.2, Cisco IOS XE Software 17.10.1, Cisco IOS XE Software 17.10.1a, Cisco IOS XE Software 17.10.1b, Cisco IOS XE Software 17.8.1, Cisco IOS XE Software 17.8.1a, Cisco IOS XE Software 17.9.1, Cisco IOS XE Software 17.9.1w, Cisco IOS XE Software 17.9.2, Cisco IOS XE Software 17.9.1a, Cisco IOS XE Software 17.9.1x, Cisco IOS XE Software 17.9.1y, Cisco IOS XE Software 17.9.3, Cisco IOS XE Software 17.9.2a, Cisco IOS XE Software 17.9.1x1, Cisco IOS XE Software 17.9.3a, Cisco IOS XE Software 17.9.4, Cisco IOS XE Software 17.9.1y1, Cisco IOS XE Software 17.11.1, Cisco IOS XE Software 17.11.1a, Cisco IOS XE Software 17.12.1, Cisco IOS XE Software 17.12.1a, Cisco IOS XE Software 17.11.99SW, Cisco IOS XE Software

Related Products

Product CVE Evidence
Cisco IOS CVE-2023-20273 Cisco OpenVuln
Cisco IOS CVE-2023-20198 Cisco OpenVuln
Cisco IOS XE Software CVE-2023-20273 Cisco OpenVuln
Cisco IOS XE Software CVE-2023-20198 Cisco OpenVuln
Cisco Catalyst 9600 Series Switches CVE-2023-20273 Cisco OpenVuln · software-dependent
Cisco Catalyst 9600 Series Switches CVE-2023-20198 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2023-20273 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2023-20198 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2023-20273 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2023-20198 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2023-20273 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2023-20198 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2023-20273 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2023-20198 Cisco OpenVuln · software-dependent