First published: Wed Mar 27 2019(Updated: )
A vulnerability in the web UI of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access sensitive configuration information. The vulnerability is due to improper access control to files within the web UI. An attacker could exploit this vulnerability by sending a malicious request to an affected device. A successful exploit could allow the attacker to gain access to sensitive configuration information.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =3.2.0ja | |
Cisco IOS XE | =16.3.1 | |
Cisco IOS XE | =16.3.1a | |
Cisco IOS XE | =16.3.2 | |
Cisco IOS XE | =16.3.3 | |
Cisco IOS XE | =16.3.4 | |
Cisco IOS XE | =16.3.5 | |
Cisco IOS XE | =16.3.5b | |
Cisco IOS XE | =16.3.6 | |
Cisco IOS XE | =16.4.1 | |
Cisco IOS XE | =16.4.2 | |
Cisco IOS XE | =16.4.3 | |
Cisco IOS XE | =16.5.1 | |
Cisco IOS XE | =16.5.1a | |
Cisco IOS XE | =16.5.1b | |
Cisco IOS XE | =16.5.2 | |
Cisco IOS XE | =16.5.3 | |
Cisco IOS XE | =16.6.1 | |
Cisco IOS XE | =16.6.2 | |
Cisco IOS XE | =16.6.3 | |
Cisco IOS XE | =16.7.1 | |
Cisco IOS XE | =16.7.1a | |
Cisco IOS XE | =16.7.1b | |
=3.2.0ja | ||
=16.3.1 | ||
=16.3.1a | ||
=16.3.2 | ||
=16.3.3 | ||
=16.3.4 | ||
=16.3.5 | ||
=16.3.5b | ||
=16.3.6 | ||
=16.4.1 | ||
=16.4.2 | ||
=16.4.3 | ||
=16.5.1 | ||
=16.5.1a | ||
=16.5.1b | ||
=16.5.2 | ||
=16.5.3 | ||
=16.6.1 | ||
=16.6.2 | ||
=16.6.3 | ||
=16.7.1 | ||
=16.7.1a | ||
=16.7.1b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.