AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() If either command is present, the HTTP Server feature is enabled for the system. To determine whether the HTTP Server feature is enabled for a system, log in to the system and use the show running-config | include ip http server|secure|active command in the CLI to check for the presence of the ip http server command or the ip http secure-server command in the global configuration. The web UI feature is enabled through the ip http server or ip http secure-server commands. These vulnerabilities affect Cisco IOS XE Software if the web UI feature is enabled. This advisory is available at the following link: ![]() CVE-2023-20273 has been assigned a CVSS Score of 7.2.īoth of these CVEs are being tracked by CSCwh87343.įor steps to close the attack vector for these vulnerabilities, see the Recommendations section of this advisory.CVE-2023-20198 has been assigned a CVSS Score of 10.0.Cisco has assigned CVE-2023-20273 to this issue. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. This allowed the user to log in with normal user access. ![]() The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. Our investigation has determined that the actors exploited two previously unknown issues. We are updating the list of fixed releases and adding the Software Checker.įix information can be found in the Fixed Software section of this advisory. ![]() Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. ![]()
0 Comments
Read More
Leave a Reply. |