First published: Mon Oct 16 2023(Updated: )
Cisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | >=16.12<16.12.10a | |
Cisco IOS XE | >=17.3<17.3.8a | |
Cisco IOS XE | >=17.6<17.6.6a | |
Cisco IOS XE | >=17.9<17.9.4a |
Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20198 refers to a privilege escalation vulnerability in Cisco IOS XE Web UI.
The severity of CVE-2023-20198 is high.
CVE-2023-20198 allows a remote, unauthenticated attacker to create an account with level 15 access and gain control of the affected device.
To fix CVE-2023-20198, apply the necessary security patches provided by Cisco.
More information about CVE-2023-20198 can be found on the Cisco Security Advisory page: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z