sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

Preview meta tags from the sec.cloudapps.cisco.com website.

Linked Hostnames

3

Search Engine Appearance

Google

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature

Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Fix information can be found in the Fixed Software section of this advisory. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343. For steps to close the attack vector for these vulnerabilities, see the Recommendations section of this advisory. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z



Bing

Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Fix information can be found in the Fixed Software section of this advisory. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343. For steps to close the attack vector for these vulnerabilities, see the Recommendations section of this advisory. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z



DuckDuckGo

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature

Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Fix information can be found in the Fixed Software section of this advisory. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343. For steps to close the attack vector for these vulnerabilities, see the Recommendations section of this advisory. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

  • General Meta Tags

    26
    • title
      Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature
    • accessLevel
      Guest
    • contentType
      cisco.com#US#preSales
    • country
      US
    • docType
      Products Security Advisory
  • Link Tags

    7
    • shortcut icon
      https://www.cisco.com/favicon.ico
    • stylesheet
      https://sec.cloudapps.cisco.com/security/center/Resources/css/FeedBack_Style.css
    • stylesheet
      https://sec.cloudapps.cisco.com/security/center/css/publicationAdv.css
    • stylesheet
      https://sec.cloudapps.cisco.com/security/center/Resources/css/content_stylesheet.css
    • stylesheet
      https://sec.cloudapps.cisco.com/security/center/css/csp_local.css

Emails

1
  • ?Subject=Cisco%20Security%20Advisory%20cisco-sa-iosxe-webui-privesc-j22SaA4z&Body=https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

Links

21