First published: Fri Sep 29 2017(Updated: )
A vulnerability in the web-based user interface (web UI) of Cisco IOS XE 16.2 could allow an authenticated, remote attacker to elevate their privileges on an affected device. The vulnerability is due to incorrect default permission settings for new users who are created by using the web UI of the affected software. An attacker could exploit this vulnerability by using the web UI of the affected software to create a new user and then logging into the web UI as the newly created user. A successful exploit could allow the attacker to elevate their privileges on the affected device. This vulnerability affects Cisco devices that are running a vulnerable release Cisco IOS XE Software, if the HTTP Server feature is enabled for the device. The newly redesigned, web-based administration UI was introduced in the Denali 16.2 Release of Cisco IOS XE Software. This vulnerability does not affect the web-based administration UI in earlier releases of Cisco IOS XE Software. Cisco Bug IDs: CSCuy83062.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12230 is rated as critical with a score of 8.8.
To fix CVE-2017-12230, ensure that proper permission settings are applied for new users in the web UI of Cisco IOS XE.
CVE-2017-12230 is caused by incorrect default permission settings for new users created via the web-based user interface in Cisco IOS XE 16.2.
CVE-2017-12230 affects users of Cisco IOS XE version 16.2.1 who utilize the web-based user interface.
Yes, remote authenticated attackers can exploit CVE-2017-12230 to elevate their privileges on affected devices.