Action not permitted
Modal body text goes here.
cve-2023-20198
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z | Mitigation, Vendor Advisory |
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco IOS XE Software |
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2023-10-16
Due date: 2023-10-20
Required action: Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.
Used in ransomware: Unknown
Notes: https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20198
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-iosxe-webui-privesc-j22SaA4z", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20198", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T18:58:11.982740Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-10-16", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-20198" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T18:58:22.360Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "16.1.1" }, { "status": "affected", "version": "16.1.2" }, { "status": "affected", "version": "16.1.3" }, { "status": "affected", "version": "16.2.1" }, { "status": "affected", "version": "16.2.2" }, { "status": "affected", "version": "16.3.1" }, { "status": "affected", "version": "16.3.2" }, { "status": "affected", "version": "16.3.3" }, { "status": "affected", "version": "16.3.1a" }, { "status": "affected", "version": "16.3.4" }, { "status": "affected", "version": "16.3.5" }, { "status": "affected", "version": "16.3.5b" }, { "status": "affected", "version": "16.3.6" }, { "status": "affected", "version": "16.3.7" }, { "status": "affected", "version": "16.3.8" }, { "status": "affected", "version": "16.3.9" }, { "status": "affected", "version": "16.3.10" }, { "status": "affected", "version": "16.3.11" }, { "status": "affected", "version": "16.4.1" }, { "status": "affected", "version": "16.4.2" }, { "status": "affected", "version": "16.4.3" }, { "status": "affected", "version": "16.5.1" }, { "status": "affected", "version": "16.5.1a" }, { "status": "affected", "version": "16.5.1b" }, { "status": "affected", "version": "16.5.2" }, { "status": "affected", "version": "16.5.3" }, { "status": "affected", "version": "16.6.1" }, { "status": "affected", "version": "16.6.2" }, { "status": "affected", "version": "16.6.3" }, { "status": "affected", "version": "16.6.4" }, { "status": "affected", "version": "16.6.5" }, { "status": "affected", "version": "16.6.4a" }, { "status": "affected", "version": "16.6.5a" }, { "status": "affected", "version": "16.6.6" }, { "status": "affected", "version": "16.6.7" }, { "status": "affected", "version": "16.6.8" }, { "status": "affected", "version": "16.6.9" }, { "status": "affected", "version": "16.6.10" }, { "status": "affected", "version": "16.7.1" }, { "status": "affected", "version": "16.7.1a" }, { "status": "affected", "version": "16.7.1b" }, { "status": "affected", "version": "16.7.2" }, { "status": "affected", "version": "16.7.3" }, { "status": "affected", "version": "16.7.4" }, { "status": "affected", "version": "16.8.1" }, { "status": "affected", "version": "16.8.1a" }, { "status": "affected", "version": "16.8.1b" }, { "status": "affected", "version": "16.8.1s" }, { "status": "affected", "version": "16.8.1c" }, { "status": "affected", "version": "16.8.1d" }, { "status": "affected", "version": "16.8.2" }, { "status": "affected", "version": "16.8.1e" }, { "status": "affected", "version": "16.8.3" }, { "status": "affected", "version": "16.9.1" }, { "status": "affected", "version": "16.9.2" }, { "status": "affected", "version": "16.9.1a" }, { "status": "affected", "version": "16.9.1b" }, { "status": "affected", "version": "16.9.1s" }, { "status": "affected", "version": "16.9.3" }, { "status": "affected", "version": "16.9.4" }, { "status": "affected", "version": "16.9.3a" }, { "status": "affected", "version": "16.9.5" }, { "status": "affected", "version": "16.9.5f" }, { "status": "affected", "version": "16.9.6" }, { "status": "affected", "version": "16.9.7" }, { "status": "affected", "version": "16.9.8" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "16.10.1a" }, { "status": "affected", "version": "16.10.1b" }, { "status": "affected", "version": "16.10.1s" }, { "status": "affected", "version": "16.10.1c" }, { "status": "affected", "version": "16.10.1e" }, { "status": "affected", "version": "16.10.1d" }, { "status": "affected", "version": "16.10.2" }, { "status": "affected", "version": "16.10.1f" }, { "status": "affected", "version": "16.10.1g" }, { "status": "affected", "version": "16.10.3" }, { "status": "affected", "version": "16.11.1" }, { "status": "affected", "version": "16.11.1a" }, { "status": "affected", "version": "16.11.1b" }, { "status": "affected", "version": "16.11.2" }, { "status": "affected", "version": "16.11.1s" }, { "status": "affected", "version": "16.12.1" }, { "status": "affected", "version": "16.12.1s" }, { "status": "affected", "version": "16.12.1a" }, { "status": "affected", "version": "16.12.1c" }, { "status": "affected", "version": "16.12.1w" }, { "status": "affected", "version": "16.12.2" }, { "status": "affected", "version": "16.12.1y" }, { "status": "affected", "version": "16.12.2a" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "16.12.2s" }, { "status": "affected", "version": "16.12.1x" }, { "status": "affected", "version": "16.12.1t" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.3s" }, { "status": "affected", "version": "16.12.3a" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "16.12.1z1" }, { "status": "affected", "version": "16.12.5a" }, { "status": "affected", "version": "16.12.5b" }, { "status": "affected", "version": "16.12.1z2" }, { "status": "affected", "version": "16.12.6a" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "16.12.9" }, { "status": "affected", "version": "16.12.10" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "17.1.1a" }, { "status": "affected", "version": "17.1.1s" }, { "status": "affected", "version": "17.1.1t" }, { "status": "affected", "version": "17.1.3" }, { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1r" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.2.1v" }, { "status": "affected", "version": "17.2.2" }, { "status": "affected", "version": "17.2.3" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "17.3.1w" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.1x" }, { "status": "affected", "version": "17.3.1z" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.3.4b" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.4.2a" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.5.1b" }, { "status": "affected", "version": "17.5.1c" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.1w" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "17.6.1x" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.1y" }, { "status": "affected", "version": "17.6.1z" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.1z1" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "17.7.1b" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.10.1a" }, { "status": "affected", "version": "17.10.1b" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.1w" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.9.1x" }, { "status": "affected", "version": "17.9.1y" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.9.1x1" }, { "status": "affected", "version": "17.9.3a" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.1y1" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.11.99SW" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343." } ], "exploits": [ { "lang": "en", "value": "Cisco is aware of active exploitation of these vulnerabilities." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-420", "description": "Unprotected Alternate Channel", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:55.900Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-iosxe-webui-privesc-j22SaA4z", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" } ], "source": { "advisory": "cisco-sa-iosxe-webui-privesc-j22SaA4z", "defects": [ "CSCwh87343" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20198", "datePublished": "2023-10-16T15:12:58.735Z", "dateReserved": "2022-10-27T18:47:50.365Z", "dateUpdated": "2024-10-23T18:58:22.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "cisa_known_exploited": { "cveID": "CVE-2023-20198", "cwes": "[\"CWE-420\"]", "dateAdded": "2023-10-16", "dueDate": "2023-10-20", "knownRansomwareCampaignUse": "Unknown", "notes": "https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20198", "product": "IOS XE Web UI", "requiredAction": "Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.", "shortDescription": "Cisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device.", "vendorProject": "Cisco", "vulnerabilityName": "Cisco IOS XE Web UI Privilege Escalation Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2023-20198\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2023-10-16T16:15:10.023\",\"lastModified\":\"2024-06-17T13:31:44.957\",\"vulnStatus\":\"Analyzed\",\"cisaExploitAdd\":\"2023-10-16\",\"cisaActionDue\":\"2023-10-20\",\"cisaRequiredAction\":\"Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.\",\"cisaVulnerabilityName\":\"Cisco IOS XE Web UI Privilege Escalation Vulnerability\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343.\"},{\"lang\":\"es\",\"value\":\"Cisco tiene conocimiento de la explotaci\u00f3n activa de una vulnerabilidad previamente desconocida en la funci\u00f3n de interfaz de usuario web del software Cisco IOS XE cuando se expone a Internet o a redes que no son de confianza. Esta vulnerabilidad permite a un atacante remoto no autenticado crear una cuenta en un sistema afectado con acceso de nivel de privilegio 15. Luego, el atacante puede usar esa cuenta para hacerse con el control del sistema afectado. Para conocer los pasos para cerrar el vector de ataque de esta vulnerabilidad, consulte la secci\u00f3n Recomendaciones de este aviso. Cisco proporcionar\u00e1 actualizaciones sobre el estado de esta investigaci\u00f3n y cu\u00e1ndo estar\u00e1 disponible un parche de software.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-420\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.12\",\"versionEndExcluding\":\"16.12.10a\",\"matchCriteriaId\":\"2C8A350D-6C3A-430F-9763-5D167C5CEAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.3\",\"versionEndExcluding\":\"17.3.8a\",\"matchCriteriaId\":\"BEA2169A-BE52-48B4-8967-D99A4BCAFF58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.6\",\"versionEndExcluding\":\"17.6.6a\",\"matchCriteriaId\":\"281561C8-E24D-4AC1-B1F8-1D32171B9A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.9\",\"versionEndExcluding\":\"17.9.4a\",\"matchCriteriaId\":\"B628DA7F-32AA-459B-95A6-AF3BFC0E765C\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}" } }
gsd-2023-20198
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-20198", "id": "GSD-2023-20198" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-20198" ], "details": "Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343.", "id": "GSD-2023-20198", "modified": "2023-12-13T01:20:27.737459Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2023-20198", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS XE Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "16.1.1" }, { "version_affected": "=", "version_value": "16.1.2" }, { "version_affected": "=", "version_value": "16.1.3" }, { "version_affected": "=", "version_value": "16.2.1" }, { "version_affected": "=", "version_value": "16.2.2" }, { "version_affected": "=", "version_value": "16.3.1" }, { "version_affected": "=", "version_value": "16.3.2" }, { "version_affected": "=", "version_value": "16.3.3" }, { "version_affected": "=", "version_value": "16.3.1a" }, { "version_affected": "=", "version_value": "16.3.4" }, { "version_affected": "=", "version_value": "16.3.5" }, { "version_affected": "=", "version_value": "16.3.5b" }, { "version_affected": "=", "version_value": "16.3.6" }, { "version_affected": "=", "version_value": "16.3.7" }, { "version_affected": "=", "version_value": "16.3.8" }, { "version_affected": "=", "version_value": "16.3.9" }, { "version_affected": "=", "version_value": "16.3.10" }, { "version_affected": "=", "version_value": "16.3.11" }, { "version_affected": "=", "version_value": "16.4.1" }, { "version_affected": "=", "version_value": "16.4.2" }, { "version_affected": "=", "version_value": "16.4.3" }, { "version_affected": "=", "version_value": "16.5.1" }, { "version_affected": "=", "version_value": "16.5.1a" }, { "version_affected": "=", "version_value": "16.5.1b" }, { "version_affected": "=", "version_value": "16.5.2" }, { "version_affected": "=", "version_value": "16.5.3" }, { "version_affected": "=", "version_value": "16.6.1" }, { "version_affected": "=", "version_value": "16.6.2" }, { "version_affected": "=", "version_value": "16.6.3" }, { "version_affected": "=", "version_value": "16.6.4" }, { "version_affected": "=", "version_value": "16.6.5" }, { "version_affected": "=", "version_value": "16.6.4a" }, { "version_affected": "=", "version_value": "16.6.5a" }, { "version_affected": "=", "version_value": "16.6.6" }, { "version_affected": "=", "version_value": "16.6.7" }, { "version_affected": "=", "version_value": "16.6.8" }, { "version_affected": "=", "version_value": "16.6.9" }, { "version_affected": "=", "version_value": "16.6.10" }, { "version_affected": "=", "version_value": "16.7.1" }, { "version_affected": "=", "version_value": "16.7.1a" }, { "version_affected": "=", "version_value": "16.7.1b" }, { "version_affected": "=", "version_value": "16.7.2" }, { "version_affected": "=", "version_value": "16.7.3" }, { "version_affected": "=", "version_value": "16.7.4" }, { "version_affected": "=", "version_value": "16.8.1" }, { "version_affected": "=", "version_value": "16.8.1a" }, { "version_affected": "=", "version_value": "16.8.1b" }, { "version_affected": "=", "version_value": "16.8.1s" }, { "version_affected": "=", "version_value": "16.8.1c" }, { "version_affected": "=", "version_value": "16.8.1d" }, { "version_affected": "=", "version_value": "16.8.2" }, { "version_affected": "=", "version_value": "16.8.1e" }, { "version_affected": "=", "version_value": "16.8.3" }, { "version_affected": "=", "version_value": "16.9.1" }, { "version_affected": "=", "version_value": "16.9.2" }, { "version_affected": "=", "version_value": "16.9.1a" }, { "version_affected": "=", "version_value": "16.9.1b" }, { "version_affected": "=", "version_value": "16.9.1s" }, { "version_affected": "=", "version_value": "16.9.3" }, { "version_affected": "=", "version_value": "16.9.4" }, { "version_affected": "=", "version_value": "16.9.3a" }, { "version_affected": "=", "version_value": "16.9.5" }, { "version_affected": "=", "version_value": "16.9.5f" }, { "version_affected": "=", "version_value": "16.9.6" }, { "version_affected": "=", "version_value": "16.9.7" }, { "version_affected": "=", "version_value": "16.9.8" }, { "version_affected": "=", "version_value": "16.10.1" }, { "version_affected": "=", "version_value": "16.10.1a" }, { "version_affected": "=", "version_value": "16.10.1b" }, { "version_affected": "=", "version_value": "16.10.1s" }, { "version_affected": "=", "version_value": "16.10.1c" }, { "version_affected": "=", "version_value": "16.10.1e" }, { "version_affected": "=", "version_value": "16.10.1d" }, { "version_affected": "=", "version_value": "16.10.2" }, { "version_affected": "=", "version_value": "16.10.1f" }, { "version_affected": "=", "version_value": "16.10.1g" }, { "version_affected": "=", "version_value": "16.10.3" }, { "version_affected": "=", "version_value": "16.11.1" }, { "version_affected": "=", "version_value": "16.11.1a" }, { "version_affected": "=", "version_value": "16.11.1b" }, { "version_affected": "=", "version_value": "16.11.2" }, { "version_affected": "=", "version_value": "16.11.1s" }, { "version_affected": "=", "version_value": "16.12.1" }, { "version_affected": "=", "version_value": "16.12.1s" }, { "version_affected": "=", "version_value": "16.12.1a" }, { "version_affected": "=", "version_value": "16.12.1c" }, { "version_affected": "=", "version_value": "16.12.1w" }, { "version_affected": "=", "version_value": "16.12.2" }, { "version_affected": "=", "version_value": "16.12.1y" }, { "version_affected": "=", "version_value": "16.12.2a" }, { "version_affected": "=", "version_value": "16.12.3" }, { "version_affected": "=", "version_value": "16.12.8" }, { "version_affected": "=", "version_value": "16.12.2s" }, { "version_affected": "=", "version_value": "16.12.1x" }, { "version_affected": "=", "version_value": "16.12.1t" }, { "version_affected": "=", "version_value": "16.12.4" }, { "version_affected": "=", "version_value": "16.12.3s" }, { "version_affected": "=", "version_value": "16.12.3a" }, { "version_affected": "=", "version_value": "16.12.4a" }, { "version_affected": "=", "version_value": "16.12.5" }, { "version_affected": "=", "version_value": "16.12.6" }, { "version_affected": "=", "version_value": "16.12.1z1" }, { "version_affected": "=", "version_value": "16.12.5a" }, { "version_affected": "=", "version_value": "16.12.5b" }, { "version_affected": "=", "version_value": "16.12.1z2" }, { "version_affected": "=", "version_value": "16.12.6a" }, { "version_affected": "=", "version_value": "16.12.7" }, { "version_affected": "=", "version_value": "16.12.9" }, { "version_affected": "=", "version_value": "16.12.10" }, { "version_affected": "=", "version_value": "17.1.1" }, { "version_affected": "=", "version_value": "17.1.1a" }, { "version_affected": "=", "version_value": "17.1.1s" }, { "version_affected": "=", "version_value": "17.1.1t" }, { "version_affected": "=", "version_value": "17.1.3" }, { "version_affected": "=", "version_value": "17.2.1" }, { "version_affected": "=", "version_value": "17.2.1r" }, { "version_affected": "=", "version_value": "17.2.1a" }, { "version_affected": "=", "version_value": "17.2.1v" }, { "version_affected": "=", "version_value": "17.2.2" }, { "version_affected": "=", "version_value": "17.2.3" }, { "version_affected": "=", "version_value": "17.3.1" }, { "version_affected": "=", "version_value": "17.3.2" }, { "version_affected": "=", "version_value": "17.3.3" }, { "version_affected": "=", "version_value": "17.3.1a" }, { "version_affected": "=", "version_value": "17.3.1w" }, { "version_affected": "=", "version_value": "17.3.2a" }, { "version_affected": "=", "version_value": "17.3.1x" }, { "version_affected": "=", "version_value": "17.3.1z" }, { "version_affected": "=", "version_value": "17.3.4" }, { "version_affected": "=", "version_value": "17.3.5" }, { "version_affected": "=", "version_value": "17.3.4a" }, { "version_affected": "=", "version_value": "17.3.6" }, { "version_affected": "=", "version_value": "17.3.4b" }, { "version_affected": "=", "version_value": "17.3.4c" }, { "version_affected": "=", "version_value": "17.3.5a" }, { "version_affected": "=", "version_value": "17.3.5b" }, { "version_affected": "=", "version_value": "17.3.7" }, { "version_affected": "=", "version_value": "17.3.8" }, { "version_affected": "=", "version_value": "17.4.1" }, { "version_affected": "=", "version_value": "17.4.2" }, { "version_affected": "=", "version_value": "17.4.1a" }, { "version_affected": "=", "version_value": "17.4.1b" }, { "version_affected": "=", "version_value": "17.4.2a" }, { "version_affected": "=", "version_value": "17.5.1" }, { "version_affected": "=", "version_value": "17.5.1a" }, { "version_affected": "=", "version_value": "17.5.1b" }, { "version_affected": "=", "version_value": "17.5.1c" }, { "version_affected": "=", "version_value": "17.6.1" }, { "version_affected": "=", "version_value": "17.6.2" }, { "version_affected": "=", "version_value": "17.6.1w" }, { "version_affected": "=", "version_value": "17.6.1a" }, { "version_affected": "=", "version_value": "17.6.1x" }, { "version_affected": "=", "version_value": "17.6.3" }, { "version_affected": "=", "version_value": "17.6.1y" }, { "version_affected": "=", "version_value": "17.6.1z" }, { "version_affected": "=", "version_value": "17.6.3a" }, { "version_affected": "=", "version_value": "17.6.4" }, { "version_affected": "=", "version_value": "17.6.1z1" }, { "version_affected": "=", "version_value": "17.6.5" }, { "version_affected": "=", "version_value": "17.6.6" }, { "version_affected": "=", "version_value": "17.7.1" }, { "version_affected": "=", "version_value": "17.7.1a" }, { "version_affected": "=", "version_value": "17.7.1b" }, { "version_affected": "=", "version_value": "17.7.2" }, { "version_affected": "=", "version_value": "17.10.1" }, { "version_affected": "=", "version_value": "17.10.1a" }, { "version_affected": "=", "version_value": "17.10.1b" }, { "version_affected": "=", "version_value": "17.8.1" }, { "version_affected": "=", "version_value": "17.8.1a" }, { "version_affected": "=", "version_value": "17.9.1" }, { "version_affected": "=", "version_value": "17.9.1w" }, { "version_affected": "=", "version_value": "17.9.2" }, { "version_affected": "=", "version_value": "17.9.1a" }, { "version_affected": "=", "version_value": "17.9.1x" }, { "version_affected": "=", "version_value": "17.9.1y" }, { "version_affected": "=", "version_value": "17.9.3" }, { "version_affected": "=", "version_value": "17.9.2a" }, { "version_affected": "=", "version_value": "17.9.1x1" }, { "version_affected": "=", "version_value": "17.9.3a" }, { "version_affected": "=", "version_value": "17.9.4" }, { "version_affected": "=", "version_value": "17.9.1y1" }, { "version_affected": "=", "version_value": "17.11.1" }, { "version_affected": "=", "version_value": "17.11.1a" }, { "version_affected": "=", "version_value": "17.12.1" }, { "version_affected": "=", "version_value": "17.12.1a" }, { "version_affected": "=", "version_value": "17.11.99SW" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343." } ] }, "exploit": [ { "lang": "en", "value": "Cisco is aware of active exploitation of these vulnerabilities." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-420", "lang": "eng", "value": "Unprotected Alternate Channel" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" } ] }, "source": { "advisory": "cisco-sa-iosxe-webui-privesc-j22SaA4z", "defects": [ "CSCwh87343" ], "discovery": "EXTERNAL" } }, "nvd.nist.gov": { "cve": { "cisaActionDue": "2023-10-20", "cisaExploitAdd": "2023-10-16", "cisaRequiredAction": "Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.", "cisaVulnerabilityName": "Cisco IOS XE Web UI Privilege Escalation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C8A350D-6C3A-430F-9763-5D167C5CEAE5", "versionEndExcluding": "16.12.10a", "versionStartIncluding": "16.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEA2169A-BE52-48B4-8967-D99A4BCAFF58", "versionEndExcluding": "17.3.8a", "versionStartIncluding": "17.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "281561C8-E24D-4AC1-B1F8-1D32171B9A2F", "versionEndExcluding": "17.6.6a", "versionStartIncluding": "17.6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "B628DA7F-32AA-459B-95A6-AF3BFC0E765C", "versionEndExcluding": "17.9.4a", "versionStartIncluding": "17.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343." }, { "lang": "es", "value": "Cisco tiene conocimiento de la explotaci\u00f3n activa de una vulnerabilidad previamente desconocida en la funci\u00f3n de interfaz de usuario web del software Cisco IOS XE cuando se expone a Internet o a redes que no son de confianza. Esta vulnerabilidad permite a un atacante remoto no autenticado crear una cuenta en un sistema afectado con acceso de nivel de privilegio 15. Luego, el atacante puede usar esa cuenta para hacerse con el control del sistema afectado. Para conocer los pasos para cerrar el vector de ataque de esta vulnerabilidad, consulte la secci\u00f3n Recomendaciones de este aviso. Cisco proporcionar\u00e1 actualizaciones sobre el estado de esta investigaci\u00f3n y cu\u00e1ndo estar\u00e1 disponible un parche de software." } ], "id": "CVE-2023-20198", "lastModified": "2024-01-25T17:15:34.820", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2023-10-16T16:15:10.023", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-420" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
icsa-23-297-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Rockwell Automation", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an unauthenticated attacker to take control of the affected system. ", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United states", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-297-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-297-01.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-23-297-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-297-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Rockwell Automation Stratix 5800 and Stratix 5200 (UPDATE A)", "tracking": { "current_release_date": "2023-11-21T07:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-297-01", "initial_release_date": "2023-10-24T06:00:00.000000Z", "revision_history": [ { "date": "2023-10-24T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2023-11-21T07:00:00.000000Z", "legacy_version": "Additional CVE added in the the vulnerability overview and mitigation section amended", "number": "2", "summary": "Additional CVE added in the the vulnerability overview and mitigation section amended" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Stratix 5800 (running Cisco IOS XE Software with the Web UI feature enabled): vers:all/*", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Stratix 5800 (running Cisco IOS XE Software with the Web UI feature enabled)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Stratix 5200 (running Cisco IOS XE Software with the Web UI feature enabled): vers:all/*", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Stratix 5200 (running Cisco IOS XE Software with the Web UI feature enabled)" } ], "category": "vendor", "name": "Rockwell Automation" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20198", "cwe": { "id": "CWE-420", "name": "Unprotected Alternate Channel" }, "notes": [ { "category": "summary", "text": "Rockwell Automation is aware of active exploitation of a previously unknown vulnerability in the web user interface feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated threat actor to create an account on a vulnerable system with privilege level 15 access. The threat actor could then potentially use that account to gain control of the affected system.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20198" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Rockwell Automation strongly encourages customers to follow guidance disabling Stratix HTTP servers on all internet-facing systems.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "To disable the HTTP Server feature, use the no ip http server or no ip http secure-server command in global configuration mode. If both the HTTP server and HTTPS server are in use, both commands are required to disable the HTTP Server feature.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Cisco Talos has provided Indicators of Compromise and Snort rules that can be found here.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/" }, { "category": "mitigation", "details": "Access Control Lists should be enabled to only allow specific IP addresses to access the Web UI of the device. Detailed instructions on how to create the Access Control List is in QA67053. (Login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141240" }, { "category": "mitigation", "details": "When implementing access controls for these services, be sure to review the controls because there is the potential for an interruption in production services.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Rockwell Automation\u0027s Security Advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.rockwellautomation.com/en-in/company/about-us/sustainability/trust-security/security-advisories.html?sort=pubAsc" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2023-20273", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Rockwell Automation is aware of active exploitation of a previously unknown vulnerability in the Web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20273" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Rockwell Automation strongly encourages customers to follow guidance disabling Stratix HTTP servers on all internet-facing systems.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "To disable the HTTP Server feature, use the no ip http server or no ip http secure-server command in global configuration mode. If both the HTTP server and HTTPS server are in use, both commands are required to disable the HTTP Server feature.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Cisco Talos has provided Indicators of Compromise and Snort rules that can be found here.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/" }, { "category": "mitigation", "details": "Access Control Lists should be enabled to only allow specific IP addresses to access the Web UI of the device. Detailed instructions on how to create the Access Control List is in QA67053. (Login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141240" }, { "category": "mitigation", "details": "When implementing access controls for these services, be sure to review the controls because there is the potential for an interruption in production services.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Rockwell Automation\u0027s Security Advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.rockwellautomation.com/en-in/company/about-us/sustainability/trust-security/security-advisories.html?sort=pubAsc" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
wid-sec-w-2023-2658
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Cisco Internetwork Operating System (IOS) ist ein Betriebssystem, das f\u00fcr Cisco Ger\u00e4te wie z. B. Router und Switches eingesetzt wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Cisco IOS XE ausnutzen, um Administrativen Zugriff zu erlangen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2658 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2658.json" }, { "category": "self", "summary": "WID-SEC-2023-2658 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2658" }, { "category": "external", "summary": "Cisco Security Advisory", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" }, { "category": "external", "summary": "Cisco Talos Report vom 2023-10-16", "url": "https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/" }, { "category": "external", "summary": "Cisco Security Advisory - cisco-sa-iosxe-webui-privesc-j22SaA4z vom 2023-10-16", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" } ], "source_lang": "en-US", "title": "Cisco IOS XE: Schwachstellen erm\u00f6glichten Administrativen Zugriff", "tracking": { "current_release_date": "2023-10-22T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:47:56.664+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2658", "initial_release_date": "2023-10-16T22:00:00.000+00:00", "revision_history": [ { "date": "2023-10-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-22T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Cisco IOS XE", "product": { "name": "Cisco IOS XE", "product_id": "T030538", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xe:-" } } }, { "category": "product_name", "name": "Cisco IOS XE \u003c 17.9.4a", "product": { "name": "Cisco IOS XE \u003c 17.9.4a", "product_id": "T030702", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xe:17.9.4a" } } }, { "category": "product_name", "name": "Cisco IOS XE \u003c 17.6.6a", "product": { "name": "Cisco IOS XE \u003c 17.6.6a", "product_id": "T030703", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xe:17.6.6a" } } }, { "category": "product_name", "name": "Cisco IOS XE \u003c 17.3.8a", "product": { "name": "Cisco IOS XE \u003c 17.3.8a", "product_id": "T030704", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xe:17.3.8a" } } }, { "category": "product_name", "name": "Cisco IOS XE \u003c 16.12.10a", "product": { "name": "Cisco IOS XE \u003c 16.12.10a", "product_id": "T030705", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xe:16.12.10a" } } } ], "category": "product_name", "name": "IOS XE" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20273", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Cisco IOS XE. Diese Fehler bestehen im WebUI, wenn dieses aus dem Internet erreichbar ist. Das WebUI l\u00e4sst sich \u00fcber die Befehle \"ip http server\" oder \"ip http secure-server\" aktivieren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Privilegien der Zugriffsstufe 15 zu erlangen. Der Angreifer kann dann dieses Konto verwenden, um die Kontrolle \u00fcber das betroffene System zu erlangen." } ], "product_status": { "known_affected": [ "T030538", "T030703", "T030702", "T030705", "T030704" ] }, "release_date": "2023-10-16T22:00:00Z", "title": "CVE-2023-20273" }, { "cve": "CVE-2023-20198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Cisco IOS XE. Diese Fehler bestehen im WebUI, wenn dieses aus dem Internet erreichbar ist. Das WebUI l\u00e4sst sich \u00fcber die Befehle \"ip http server\" oder \"ip http secure-server\" aktivieren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Privilegien der Zugriffsstufe 15 zu erlangen. Der Angreifer kann dann dieses Konto verwenden, um die Kontrolle \u00fcber das betroffene System zu erlangen." } ], "product_status": { "known_affected": [ "T030538", "T030703", "T030702", "T030705", "T030704" ] }, "release_date": "2023-10-16T22:00:00Z", "title": "CVE-2023-20198" } ] }
ghsa-4xrf-pcxr-rf3c
Vulnerability from github
Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system.
For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisory
Cisco will provide updates on the status of this investigation and when a software patch is available.
{ "affected": [], "aliases": [ "CVE-2023-20198" ], "database_specific": { "cwe_ids": [ "CWE-420" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-10-16T16:15:10Z", "severity": "CRITICAL" }, "details": "Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system.\n\n For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisory\u00a0\n\n Cisco will provide updates on the status of this investigation and when a software patch is available.", "id": "GHSA-4xrf-pcxr-rf3c", "modified": "2024-01-25T18:30:45Z", "published": "2023-10-16T18:30:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20198" }, { "type": "WEB", "url": "https://arstechnica.com/security/2023/10/actively-exploited-cisco-0-day-with-maximum-10-severity-gives-full-network-control" }, { "type": "WEB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" }, { "type": "WEB", "url": "https://www.cisa.gov/guidance-addressing-cisco-ios-xe-web-ui-vulnerabilities" }, { "type": "WEB", "url": "https://www.darkreading.com/vulnerabilities-threats/critical-unpatched-cisco-zero-day-bug-active-exploit" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cisco-sa-iosxe-webui-privesc-j22saa4z
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "These vulnerabilities were found during the resolution of multiple Cisco TAC support cases." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker.\r\n\r\nFix information can be found in the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nOur investigation has determined that the actors exploited two previously unknown issues.\r\n\r\nThe attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access.\r\n\r\nThe attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue.\r\n\r\nCVE-2023-20198 has been assigned a CVSS Score of 10.0.\r\nCVE-2023-20273 has been assigned a CVSS Score of 7.2.\r\n\r\nBoth of these CVEs are being tracked by CSCwh87343 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh87343\"].\r\n\r\nFor steps to close the attack vector for these vulnerabilities, see the Recommendations [\"#REC\"] section of this advisory.\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "These vulnerabilities affect Cisco IOS XE Software if the web UI feature is enabled. The web UI feature is enabled through the ip http server or ip http secure-server commands.\r\n Determine the HTTP Server Configuration\r\nTo determine whether the HTTP Server feature is enabled for a system, log in to the system and use the show running-config | include ip http server|secure|active command in the CLI to check for the presence of the ip http server command or the ip http secure-server command in the global configuration. If either command is present, the HTTP Server feature is enabled for the system.\r\n\r\nThe following example shows the output of the show running-config | include ip http server|secure|active command for a system that has the HTTP Server feature enabled:\r\n\r\n\r\nRouter# show running-config | include ip http server|secure|active\r\nip http server\r\nip http secure-server\r\n\r\nNote: The presence of either command or both commands in the system configuration indicates that the web UI feature is enabled.\r\n\r\nIf the ip http server command is present and the configuration also contains ip http active-session-modules none, these vulnerabilities are not exploitable over HTTP.\r\n\r\nIf the ip http secure-server command is present and the configuration also contains ip http secure-active-session-modules none, these vulnerabilities are not exploitable over HTTPS.", "title": "Vulnerable Products" }, { "category": "general", "text": "Cisco has confirmed that these vulnerabilities do not affect the following Cisco products:\r\n\r\nAdaptive Security Appliance (ASA) Software\r\nFirepower Threat Defense (FTD) Software\r\nIdentity Services Engine (ISE)\r\nIOS Software\r\nIOS XE Software prior to Release 16\r\nNX-OS Software", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "The web UI is an embedded GUI-based system-management tool that provides the ability to provision the system, to simplify system deployment and manageability, and to enhance the user experience. It comes with the default image, so there is no need to enable anything or install any license on the system. The web UI can be used to build configurations as well as to monitor and troubleshoot the system without CLI expertise.", "title": "Details" }, { "category": "general", "text": "To determine whether a system may have been compromised, perform the following checks:\r\n\r\nCheck the system logs for the presence of any of the following log messages where user could be cisco_tac_admin, cisco_support or any configured, local user that is unknown to the network administrator:\r\n\r\n\r\n%SYS-5-CONFIG_P: Configured programmatically by process SEP_webui_wsma_http from console as user on line\r\n\r\n%SEC_LOGIN-5-WEBLOGIN_SUCCESS: Login Success [user: user] [Source: source_IP_address] at 03:42:13 UTC Wed Oct 11 2023\r\n\r\nNote: The %SYS-5-CONFIG_P message will be present for each instance that a user has accessed the web UI. The indicator to look for is new or unknown usernames present in the message.\r\n\r\nCheck the system logs for the following message where filename is an unknown filename that does not correlate with an expected file installation action:\r\n\r\n\r\n%WEBUI-6-INSTALL_OPERATION_INFO: User: username, Install Operation: ADD filename\r\n\r\nCisco Talos has provided the following command to check for the presence of the implant where systemip is the IP address of the system to check. This command should be issued from a workstation with access to the system in question:\r\n\r\n\r\ncurl -k -H \"Authorization: 0ff4fbf0ecffa77ce8d3852a29263e263838e9bb\" -X POST \"https://systemip/webui/logoutconfirm.html?logon_hash=1\"\r\n\r\n\r\nIf the request returns a hexadecimal string such as 0123456789abcdef01, the implant is present.\r\n\r\nNote: The above command should be entered as a single command line.\r\n\r\nNote: If the system is configured for HTTP access only, use the HTTP scheme in the command example.\r\n\r\nThe following Snort rule IDs are also available to detect exploitation:\r\n\r\n3:50118 - alerts for initial implant injection (CVE-2023-20273)\r\n3:62527 - alerts for implant interaction\r\n3:62528 - alerts for implant interaction\r\n3:62529 - alerts for implant interaction\r\n3:62541 - alerts on attempted exploitation for initial access (CVE-2023-20198)\r\n3:62542 - alerts on attempted exploitation for initial access (CVE-2023-20198)", "title": "Indicators of Compromise" }, { "category": "general", "text": "There are no workarounds that address these vulnerabilities.\r\n\r\nDisabling the HTTP Server feature eliminates the attack vector for these vulnerabilities and may be a suitable mitigation until affected devices can be upgraded. Administrators can disable the HTTP Server feature by using the no ip http server or no ip http secure-server command in global configuration mode. If both http server and http-secure server are in use, then both commands are required to disable the HTTP Server feature.\r\n\r\nLimiting access to the HTTP Server to trusted networks will limit exposure to these vulnerabilities. The following example shows how to allow remote access to the HTTP Server from the trusted 192.168.0.0/24 network:\r\n\r\n\r\n!\r\nip http access-class 75\r\nip http secure-server\r\n!\r\naccess-list 75 permit 192.168.0.0 0.0.0.255\r\naccess-list 75 deny any\r\n!\r\n\r\nNote: To apply the access list in newer versions of Cisco IOS XE Software, use the ip http access-class ipv4 75 command for the previous example. See Filter Traffic Destined to Cisco IOS XE Devices WebUI Using an Access List [\"https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-17/221107-filter-traffic-destined-to-cisco-ios-xe.html\"] for additional information.\r\n\r\nWhile this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.", "title": "Workarounds" }, { "category": "general", "text": "Cisco has released free software updates [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu\"] that address the vulnerabilities described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.\r\n\r\nCustomers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nThe Cisco Support and Downloads page [\"https://www.cisco.com/c/en/us/support/index.html\"] on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Fixed Releases\r\nCustomers are advised to upgrade to an appropriate fixed software release [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] as indicated in the following table:\r\n Cisco IOS XE Software Release Train First Fixed Release Available 17.9 17.9.4a Yes 17.6 17.6.6a Yes 17.3 17.3.8a Yes 16.12 (Catalyst 3650 and 3850 only) 16.12.10a Yes\r\nThe SMUs in the following table address Cisco Bug ID CSCwh87343 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh87343\"]:\r\n Cisco IOS XE Software Release Train Base Release SMU Available 17.9 17.9.4 Yes 17.6 17.6.5 Yes\r\nFor detailed platform release information, see Software Fix Availability for Cisco IOS XE Software Web UI Privilege Escalation Vulnerability - CVE-2023-20198 [\"https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html\"].\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"]. This tool identifies any Cisco security advisories that impact a specific software release and the earliest release that fixes the vulnerabilities that are described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities that are described in all the advisories that the Software Checker identifies (\u201cCombined First Fixed\u201d).\r\n\r\nTo use the tool, go to the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] page and follow the instructions. Alternatively, use the following form to determine whether a release is affected by any Cisco Security Advisory. To use the form, follow these steps:\r\n\r\nChoose which advisories the tool will search\u2014only this advisory, only advisories with a Critical or High Security Impact Rating (SIR) [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#asr\"], or all advisories.\r\nEnter a release number\u2014for example, 15.9(3)M2 or 17.3.3.\r\nClick Check.\r\n\r\n Only this advisory All Critical and High advisories All advisories\r\n\r\n\r\n\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "Cisco strongly recommends that customers disable the HTTP Server feature on all internet-facing systems or restrict its access to trusted source addresses. To disable the HTTP Server feature, use the no ip http server or no ip http secure-server command in global configuration mode. If both the HTTP server and HTTPS server are in use, both commands are required to disable the HTTP Server feature.\r\n\r\nThe following decision tree can be used to help determine how to triage an environment and deploy protections:\r\n\r\nAre you running IOS XE?\r\nNo. The system is not vulnerable. No further action is necessary.\r\nYes. Is ip http server or ip http secure-server configured?\r\nNo. The vulnerabilities are not exploitable. No further action is necessary.\r\nYes. Do you run services that require HTTP/HTTPS communication (for example, eWLC)?\r\nNo. Disable the HTTP Server feature.\r\nYes. If possible, restrict access to those services to trusted networks.\r\n\r\n\r\n\r\n\r\nWe assess with high confidence, based on further understanding of the exploit, that access lists applied to the HTTP Server feature to restrict access from untrusted hosts and networks are an effective mitigation.\r\n\r\nWhen implementing access controls for these services, as per the mitigations provided, be sure to review the controls because there is the potential for an interruption in production services. If you are unsure of these steps, work with your support organization to determine appropriate control measures.\r\n\r\nAfter implementing any changes, use the copy running-configuration startup-configuration command to save the running-configuration. This will ensure that the changes are not reverted in the event of a system reload.\r\n\r\nFor additional information on the impact of disabling the HTTP Server feature, see Cisco TAC Technical FAQs for Cisco IOS XE Software Web UI Privilege Escalation Vulnerability - CVE-2023-20198 [\"https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-17/221144-cisco-tac-technical-faqs-for-cisco-ios-x.html\"].", "title": "Recommendations" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "Cisco is aware of active exploitation of these vulnerabilities.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "These vulnerabilities were found during the resolution of multiple Cisco TAC support cases.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "CSCwh87343", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh87343" }, { "category": "external", "summary": "Filter Traffic Destined to Cisco IOS XE Devices WebUI Using an Access List", "url": "https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-17/221107-filter-traffic-destined-to-cisco-ios-xe.html" }, { "category": "external", "summary": "free software updates", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html", "url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html" }, { "category": "external", "summary": "Cisco Support and Downloads page", "url": "https://www.cisco.com/c/en/us/support/index.html" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html", "url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html" }, { "category": "external", "summary": "Software Fix Availability for Cisco IOS XE Software Web UI Privilege Escalation Vulnerability - CVE-2023-20198", "url": "https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html" }, { "category": "external", "summary": "Cisco Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" }, { "category": "external", "summary": "Security Impact Rating (SIR)", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#asr" }, { "category": "external", "summary": "Cisco TAC Technical FAQs for Cisco IOS XE Software Web UI Privilege Escalation Vulnerability - CVE-2023-20198", "url": "https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-17/221144-cisco-tac-technical-faqs-for-cisco-ios-x.html" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature", "tracking": { "current_release_date": "2023-11-01T15:44:28+00:00", "generator": { "date": "2024-05-10T23:27:32+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-iosxe-webui-privesc-j22SaA4z", "initial_release_date": "2023-10-16T15:00:00+00:00", "revision_history": [ { "date": "2023-10-16T15:04:20+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2023-10-16T21:11:26+00:00", "number": "1.1.0", "summary": "Added triage decision tree." }, { "date": "2023-10-17T12:18:12+00:00", "number": "1.2.0", "summary": "Added access list mitigation." }, { "date": "2023-10-20T16:43:51+00:00", "number": "1.3.0", "summary": "Added CVE-2023-20273. Added information about observed attacks. Added mitigation. Updated Snort rule IDs." }, { "date": "2023-10-22T16:45:48+00:00", "number": "1.4.0", "summary": "Updated summary to indicate the first fixes are available.\nAdded specific fixed release information." }, { "date": "2023-10-23T19:59:06+00:00", "number": "2.0.0", "summary": "Updated summary to indicate enhanced detection is available.\r\nUpdated indicators of compromise with enhanced detection command." }, { "date": "2023-10-25T18:01:48+00:00", "number": "2.1.0", "summary": "Updated summary to indicate SMU availability.\r\nUpdated fixed software with SMU availability table." }, { "date": "2023-10-26T16:32:40+00:00", "number": "2.2.0", "summary": "Updated summary to indicate the change in products confirmed not vulnerable. Updated list of products confirmed not vulnerable. Updated SMU table content." }, { "date": "2023-10-27T13:57:46+00:00", "number": "2.3.0", "summary": "Updated summary to indicate additional fixed releases. Updated fixed release table and SMU table. Updated recommendations to add link to technical FAQ." }, { "date": "2023-10-30T13:14:35+00:00", "number": "2.4.0", "summary": "Updated summary to indicate additional fixed releases and updated fixed release table." }, { "date": "2023-10-31T18:39:09+00:00", "number": "2.5.0", "summary": "Updated fixed release table and added software checker and updated summary to reflect these changes." }, { "date": "2023-11-01T15:44:28+00:00", "number": "2.6.0", "summary": "Updated the list of products confirmed not vulnerable." } ], "status": "final", "version": "2.6.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "service_pack", "name": "16.1.1", "product": { "name": "16.1.1", "product_id": "CSAFPID-212436" } }, { "category": "service_pack", "name": "16.1.2", "product": { "name": "16.1.2", "product_id": "CSAFPID-213100" } }, { "category": "service_pack", "name": "16.1.3", "product": { "name": "16.1.3", "product_id": "CSAFPID-214993" } } ], "category": "product_version", "name": "16.1" }, { "branches": [ { "category": "service_pack", "name": "16.2.1", "product": { "name": "16.2.1", "product_id": "CSAFPID-213809" } }, { "category": "service_pack", "name": "16.2.2", "product": { "name": "16.2.2", "product_id": "CSAFPID-217253" } } ], "category": "product_version", "name": "16.2" }, { "branches": [ { "category": "service_pack", "name": "16.3.1", "product": { "name": "16.3.1", "product_id": "CSAFPID-213960" } }, { "category": "service_pack", "name": "16.3.2", "product": { "name": "16.3.2", "product_id": "CSAFPID-217255" } }, { "category": "service_pack", "name": "16.3.3", "product": { "name": "16.3.3", "product_id": "CSAFPID-217256" } }, { "category": "service_pack", "name": "16.3.1a", "product": { "name": "16.3.1a", "product_id": "CSAFPID-220802" } }, { "category": "service_pack", "name": "16.3.4", "product": { "name": "16.3.4", "product_id": "CSAFPID-222711" } }, { "category": "service_pack", "name": "16.3.5", "product": { "name": "16.3.5", "product_id": "CSAFPID-229124" } }, { "category": "service_pack", "name": "16.3.5b", "product": { "name": "16.3.5b", "product_id": "CSAFPID-231187" } }, { "category": "service_pack", "name": "16.3.6", "product": { "name": "16.3.6", "product_id": "CSAFPID-231667" } }, { "category": "service_pack", "name": "16.3.7", "product": { "name": "16.3.7", "product_id": "CSAFPID-239264" } }, { "category": "service_pack", "name": "16.3.8", "product": { "name": "16.3.8", "product_id": "CSAFPID-251165" } }, { "category": "service_pack", "name": "16.3.9", "product": { "name": "16.3.9", "product_id": "CSAFPID-262389" } }, { "category": "service_pack", "name": "16.3.10", "product": { "name": "16.3.10", "product_id": "CSAFPID-273563" } }, { "category": "service_pack", "name": "16.3.11", "product": { "name": "16.3.11", "product_id": "CSAFPID-278402" } } ], "category": "product_version", "name": "16.3" }, { "branches": [ { "category": "service_pack", "name": "16.4.1", "product": { "name": "16.4.1", "product_id": "CSAFPID-214051" } }, { "category": "service_pack", "name": "16.4.2", "product": { "name": "16.4.2", "product_id": "CSAFPID-217257" } }, { "category": "service_pack", "name": "16.4.3", "product": { "name": "16.4.3", "product_id": "CSAFPID-231390" } } ], "category": "product_version", "name": "16.4" }, { "branches": [ { "category": "service_pack", "name": "16.5.1", "product": { "name": "16.5.1", "product_id": "CSAFPID-217259" } }, { "category": "service_pack", "name": "16.5.1a", "product": { "name": "16.5.1a", "product_id": "CSAFPID-225784" } }, { "category": "service_pack", "name": "16.5.1b", "product": { "name": "16.5.1b", "product_id": "CSAFPID-226330" } }, { "category": "service_pack", "name": "16.5.2", "product": { "name": "16.5.2", "product_id": "CSAFPID-229187" } }, { "category": "service_pack", "name": "16.5.3", "product": { "name": "16.5.3", "product_id": "CSAFPID-232461" } } ], "category": "product_version", "name": "16.5" }, { "branches": [ { "category": "service_pack", "name": "16.6.1", "product": { "name": "16.6.1", "product_id": "CSAFPID-218901" } }, { "category": "service_pack", "name": "16.6.2", "product": { "name": "16.6.2", "product_id": "CSAFPID-228706" } }, { "category": "service_pack", "name": "16.6.3", "product": { "name": "16.6.3", "product_id": "CSAFPID-231682" } }, { "category": "service_pack", "name": "16.6.4", "product": { "name": "16.6.4", "product_id": "CSAFPID-233155" } }, { "category": "service_pack", "name": "16.6.5", "product": { "name": "16.6.5", "product_id": "CSAFPID-241736" } }, { "category": "service_pack", "name": "16.6.4s", "product": { "name": "16.6.4s", "product_id": "CSAFPID-244900" } }, { "category": "service_pack", "name": "16.6.4a", "product": { "name": "16.6.4a", "product_id": "CSAFPID-247629" } }, { "category": "service_pack", "name": "16.6.5a", "product": { "name": "16.6.5a", "product_id": "CSAFPID-252235" } }, { "category": "service_pack", "name": "16.6.6", "product": { "name": "16.6.6", "product_id": "CSAFPID-252914" } }, { "category": "service_pack", "name": "16.6.5b", "product": { "name": "16.6.5b", "product_id": "CSAFPID-258170" } }, { "category": "service_pack", "name": "16.6.7", "product": { "name": "16.6.7", "product_id": "CSAFPID-261241" } }, { "category": "service_pack", "name": "16.6.7a", "product": { "name": "16.6.7a", "product_id": "CSAFPID-270097" } }, { "category": "service_pack", "name": "16.6.8", "product": { "name": "16.6.8", "product_id": "CSAFPID-277148" } }, { "category": "service_pack", "name": "16.6.9", "product": { "name": "16.6.9", "product_id": "CSAFPID-280801" } }, { "category": "service_pack", "name": "16.6.10", "product": { "name": "16.6.10", "product_id": "CSAFPID-283835" } } ], "category": "product_version", "name": "16.6" }, { "branches": [ { "category": "service_pack", "name": "16.7.1", "product": { "name": "16.7.1", "product_id": "CSAFPID-218903" } }, { "category": "service_pack", "name": "16.7.1a", "product": { "name": "16.7.1a", "product_id": "CSAFPID-231389" } }, { "category": "service_pack", "name": "16.7.1b", "product": { "name": "16.7.1b", "product_id": "CSAFPID-232767" } }, { "category": "service_pack", "name": "16.7.2", "product": { "name": "16.7.2", "product_id": "CSAFPID-236837" } }, { "category": "service_pack", "name": "16.7.3", "product": { "name": "16.7.3", "product_id": "CSAFPID-244070" } }, { "category": "service_pack", "name": "16.7.4", "product": { "name": "16.7.4", "product_id": "CSAFPID-258388" } } ], "category": "product_version", "name": "16.7" }, { "branches": [ { "category": "service_pack", "name": "16.8.1", "product": { "name": "16.8.1", "product_id": "CSAFPID-218905" } }, { "category": "service_pack", "name": "16.8.1a", "product": { "name": "16.8.1a", "product_id": "CSAFPID-235307" } }, { "category": "service_pack", "name": "16.8.1b", "product": { "name": "16.8.1b", "product_id": "CSAFPID-235858" } }, { "category": "service_pack", "name": "16.8.1s", "product": { "name": "16.8.1s", "product_id": "CSAFPID-236834" } }, { "category": "service_pack", "name": "16.8.1c", "product": { "name": "16.8.1c", "product_id": "CSAFPID-237460" } }, { "category": "service_pack", "name": "16.8.1d", "product": { "name": "16.8.1d", "product_id": "CSAFPID-242834" } }, { "category": "service_pack", "name": "16.8.2", "product": { "name": "16.8.2", "product_id": "CSAFPID-244071" } }, { "category": "service_pack", "name": "16.8.1e", "product": { "name": "16.8.1e", "product_id": "CSAFPID-249171" } }, { "category": "service_pack", "name": "16.8.3", "product": { "name": "16.8.3", "product_id": "CSAFPID-257984" } } ], "category": "product_version", "name": "16.8" }, { "branches": [ { "category": "service_pack", "name": "16.9.1", "product": { "name": "16.9.1", "product_id": "CSAFPID-225856" } }, { "category": "service_pack", "name": "16.9.2", "product": { "name": "16.9.2", "product_id": "CSAFPID-232008" } }, { "category": "service_pack", "name": "16.9.1a", "product": { "name": "16.9.1a", "product_id": "CSAFPID-242308" } }, { "category": "service_pack", "name": "16.9.1b", "product": { "name": "16.9.1b", "product_id": "CSAFPID-243362" } }, { "category": "service_pack", "name": "16.9.1s", "product": { "name": "16.9.1s", "product_id": "CSAFPID-244530" } }, { "category": "service_pack", "name": "16.9.1c", "product": { "name": "16.9.1c", "product_id": "CSAFPID-245375" } }, { "category": "service_pack", "name": "16.9.1d", "product": { "name": "16.9.1d", "product_id": "CSAFPID-248242" } }, { "category": "service_pack", "name": "16.9.3", "product": { "name": "16.9.3", "product_id": "CSAFPID-251075" } }, { "category": "service_pack", "name": "16.9.2a", "product": { "name": "16.9.2a", "product_id": "CSAFPID-251166" } }, { "category": "service_pack", "name": "16.9.2s", "product": { "name": "16.9.2s", "product_id": "CSAFPID-252272" } }, { "category": "service_pack", "name": "16.9.3h", "product": { "name": "16.9.3h", "product_id": "CSAFPID-258229" } }, { "category": "service_pack", "name": "16.9.4", "product": { "name": "16.9.4", "product_id": "CSAFPID-262390" } }, { "category": "service_pack", "name": "16.9.3s", "product": { "name": "16.9.3s", "product_id": "CSAFPID-262549" } }, { "category": "service_pack", "name": "16.9.3a", "product": { "name": "16.9.3a", "product_id": "CSAFPID-263804" } }, { "category": "service_pack", "name": "16.9.4c", "product": { "name": "16.9.4c", "product_id": "CSAFPID-268921" } }, { "category": "service_pack", "name": "16.9.5", "product": { "name": "16.9.5", "product_id": "CSAFPID-271798" } }, { "category": "service_pack", "name": "16.9.5f", "product": { "name": "16.9.5f", "product_id": "CSAFPID-276837" } }, { "category": "service_pack", "name": "16.9.6", "product": { "name": "16.9.6", "product_id": "CSAFPID-277945" } }, { "category": "service_pack", "name": "16.9.7", "product": { "name": "16.9.7", "product_id": "CSAFPID-280651" } }, { "category": "service_pack", "name": "16.9.8", "product": { "name": "16.9.8", "product_id": "CSAFPID-280938" } }, { "category": "service_pack", "name": "16.9.8a", "product": { "name": "16.9.8a", "product_id": "CSAFPID-290562" } }, { "category": "service_pack", "name": "16.9.8b", "product": { "name": "16.9.8b", "product_id": "CSAFPID-290669" } } ], "category": "product_version", "name": "16.9" }, { "branches": [ { "category": "service_pack", "name": "16.10.1", "product": { "name": "16.10.1", "product_id": "CSAFPID-225858" } }, { "category": "service_pack", "name": "16.10.1a", "product": { "name": "16.10.1a", "product_id": "CSAFPID-250629" } }, { "category": "service_pack", "name": "16.10.1b", "product": { "name": "16.10.1b", "product_id": "CSAFPID-252045" } }, { "category": "service_pack", "name": "16.10.1s", "product": { "name": "16.10.1s", "product_id": "CSAFPID-252913" } }, { "category": "service_pack", "name": "16.10.1c", "product": { "name": "16.10.1c", "product_id": "CSAFPID-254688" } }, { "category": "service_pack", "name": "16.10.1e", "product": { "name": "16.10.1e", "product_id": "CSAFPID-257955" } }, { "category": "service_pack", "name": "16.10.1d", "product": { "name": "16.10.1d", "product_id": "CSAFPID-258900" } }, { "category": "service_pack", "name": "16.10.2", "product": { "name": "16.10.2", "product_id": "CSAFPID-260917" } }, { "category": "service_pack", "name": "16.10.1f", "product": { "name": "16.10.1f", "product_id": "CSAFPID-262595" } }, { "category": "service_pack", "name": "16.10.1g", "product": { "name": "16.10.1g", "product_id": "CSAFPID-266259" } }, { "category": "service_pack", "name": "16.10.3", "product": { "name": "16.10.3", "product_id": "CSAFPID-273112" } } ], "category": "product_version", "name": "16.10" }, { "branches": [ { "category": "service_pack", "name": "16.11.1", "product": { "name": "16.11.1", "product_id": "CSAFPID-227918" } }, { "category": "service_pack", "name": "16.11.1a", "product": { "name": "16.11.1a", "product_id": "CSAFPID-252271" } }, { "category": "service_pack", "name": "16.11.1b", "product": { "name": "16.11.1b", "product_id": "CSAFPID-260741" } }, { "category": "service_pack", "name": "16.11.2", "product": { "name": "16.11.2", "product_id": "CSAFPID-261240" } }, { "category": "service_pack", "name": "16.11.1s", "product": { "name": "16.11.1s", "product_id": "CSAFPID-261465" } }, { "category": "service_pack", "name": "16.11.1c", "product": { "name": "16.11.1c", "product_id": "CSAFPID-264096" } } ], "category": "product_version", "name": "16.11" }, { "branches": [ { "category": "service_pack", "name": "16.12.1", "product": { "name": "16.12.1", "product_id": "CSAFPID-227920" } }, { "category": "service_pack", "name": "16.12.1s", "product": { "name": "16.12.1s", "product_id": "CSAFPID-265735" } }, { "category": "service_pack", "name": "16.12.1a", "product": { "name": "16.12.1a", "product_id": "CSAFPID-265841" } }, { "category": "service_pack", "name": "16.12.1c", "product": { "name": "16.12.1c", "product_id": "CSAFPID-267110" } }, { "category": "service_pack", "name": "16.12.1w", "product": { "name": "16.12.1w", "product_id": "CSAFPID-267240" } }, { "category": "service_pack", "name": "16.12.2", "product": { "name": "16.12.2", "product_id": "CSAFPID-267605" } }, { "category": "service_pack", "name": "16.12.1y", "product": { "name": "16.12.1y", "product_id": "CSAFPID-271938" } }, { "category": "service_pack", "name": "16.12.2a", "product": { "name": "16.12.2a", "product_id": "CSAFPID-272047" } }, { "category": "service_pack", "name": "16.12.3", "product": { "name": "16.12.3", "product_id": "CSAFPID-273445" } }, { "category": "service_pack", "name": "16.12.8", "product": { "name": "16.12.8", "product_id": "CSAFPID-273448" } }, { "category": "service_pack", "name": "16.12.2s", "product": { "name": "16.12.2s", "product_id": "CSAFPID-273509" } }, { "category": "service_pack", "name": "16.12.1x", "product": { "name": "16.12.1x", "product_id": "CSAFPID-273649" } }, { "category": "service_pack", "name": "16.12.1t", "product": { "name": "16.12.1t", "product_id": "CSAFPID-274832" } }, { "category": "service_pack", "name": "16.12.2t", "product": { "name": "16.12.2t", "product_id": "CSAFPID-275538" } }, { "category": "service_pack", "name": "16.12.4", "product": { "name": "16.12.4", "product_id": "CSAFPID-277147" } }, { "category": "service_pack", "name": "16.12.3s", "product": { "name": "16.12.3s", "product_id": "CSAFPID-277255" } }, { "category": "service_pack", "name": "16.12.1z", "product": { "name": "16.12.1z", "product_id": "CSAFPID-277256" } }, { "category": "service_pack", "name": "16.12.3a", "product": { "name": "16.12.3a", "product_id": "CSAFPID-277321" } }, { "category": "service_pack", "name": "16.12.4a", "product": { "name": "16.12.4a", "product_id": "CSAFPID-278881" } }, { "category": "service_pack", "name": "16.12.5", "product": { "name": "16.12.5", "product_id": "CSAFPID-280463" } }, { "category": "service_pack", "name": "16.12.6", "product": { "name": "16.12.6", "product_id": "CSAFPID-280937" } }, { "category": "service_pack", "name": "16.12.1z1", "product": { "name": "16.12.1z1", "product_id": "CSAFPID-281320" } }, { "category": "service_pack", "name": "16.12.5a", "product": { "name": "16.12.5a", "product_id": "CSAFPID-281438" } }, { "category": "service_pack", "name": "16.12.5b", "product": { "name": "16.12.5b", "product_id": "CSAFPID-281654" } }, { "category": "service_pack", "name": "16.12.1z2", "product": { "name": "16.12.1z2", "product_id": "CSAFPID-283831" } }, { "category": "service_pack", "name": "16.12.6a", "product": { "name": "16.12.6a", "product_id": "CSAFPID-285325" } }, { "category": "service_pack", "name": "16.12.7", "product": { "name": "16.12.7", "product_id": "CSAFPID-286031" } }, { "category": "service_pack", "name": "16.12.9", "product": { "name": "16.12.9", "product_id": "CSAFPID-292510" } }, { "category": "service_pack", "name": "16.12.10", "product": { "name": "16.12.10", "product_id": "CSAFPID-295421" } } ], "category": "product_version", "name": "16.12" }, { "branches": [ { "category": "service_pack", "name": "17.1.1", "product": { "name": "17.1.1", "product_id": "CSAFPID-245377" } }, { "category": "service_pack", "name": "17.1.1a", "product": { "name": "17.1.1a", "product_id": "CSAFPID-272932" } }, { "category": "service_pack", "name": "17.1.1s", "product": { "name": "17.1.1s", "product_id": "CSAFPID-274818" } }, { "category": "service_pack", "name": "17.1.2", "product": { "name": "17.1.2", "product_id": "CSAFPID-277338" } }, { "category": "service_pack", "name": "17.1.1t", "product": { "name": "17.1.1t", "product_id": "CSAFPID-277348" } }, { "category": "service_pack", "name": "17.1.3", "product": { "name": "17.1.3", "product_id": "CSAFPID-280652" } } ], "category": "product_version", "name": "17.1" }, { "branches": [ { "category": "service_pack", "name": "17.2.1", "product": { "name": "17.2.1", "product_id": "CSAFPID-251225" } }, { "category": "service_pack", "name": "17.2.1r", "product": { "name": "17.2.1r", "product_id": "CSAFPID-277194" } }, { "category": "service_pack", "name": "17.2.1a", "product": { "name": "17.2.1a", "product_id": "CSAFPID-277343" } }, { "category": "service_pack", "name": "17.2.1v", "product": { "name": "17.2.1v", "product_id": "CSAFPID-278002" } }, { "category": "service_pack", "name": "17.2.2", "product": { "name": "17.2.2", "product_id": "CSAFPID-278504" } }, { "category": "service_pack", "name": "17.2.3", "product": { "name": "17.2.3", "product_id": "CSAFPID-280939" } } ], "category": "product_version", "name": "17.2" }, { "branches": [ { "category": "service_pack", "name": "17.3.1", "product": { "name": "17.3.1", "product_id": "CSAFPID-254712" } }, { "category": "service_pack", "name": "17.3.2", "product": { "name": "17.3.2", "product_id": "CSAFPID-277099" } }, { "category": "service_pack", "name": "17.3.3", "product": { "name": "17.3.3", "product_id": "CSAFPID-278019" } }, { "category": "service_pack", "name": "17.3.1a", "product": { "name": "17.3.1a", "product_id": "CSAFPID-279338" } }, { "category": "service_pack", "name": "17.3.1w", "product": { "name": "17.3.1w", "product_id": "CSAFPID-279339" } }, { "category": "service_pack", "name": "17.3.2a", "product": { "name": "17.3.2a", "product_id": "CSAFPID-280555" } }, { "category": "service_pack", "name": "17.3.1x", "product": { "name": "17.3.1x", "product_id": "CSAFPID-280783" } }, { "category": "service_pack", "name": "17.3.1z", "product": { "name": "17.3.1z", "product_id": "CSAFPID-281331" } }, { "category": "service_pack", "name": "17.3.3a", "product": { "name": "17.3.3a", "product_id": "CSAFPID-282017" } }, { "category": "service_pack", "name": "17.3.4", "product": { "name": "17.3.4", "product_id": "CSAFPID-282028" } }, { "category": "service_pack", "name": "17.3.5", "product": { "name": "17.3.5", "product_id": "CSAFPID-282115" } }, { "category": "service_pack", "name": "17.3.4a", "product": { "name": "17.3.4a", "product_id": "CSAFPID-284178" } }, { "category": "service_pack", "name": "17.3.6", "product": { "name": "17.3.6", "product_id": "CSAFPID-284331" } }, { "category": "service_pack", "name": "17.3.4b", "product": { "name": "17.3.4b", "product_id": "CSAFPID-285326" } }, { "category": "service_pack", "name": "17.3.4c", "product": { "name": "17.3.4c", "product_id": "CSAFPID-285327" } }, { "category": "service_pack", "name": "17.3.5a", "product": { "name": "17.3.5a", "product_id": "CSAFPID-286498" } }, { "category": "service_pack", "name": "17.3.5b", "product": { "name": "17.3.5b", "product_id": "CSAFPID-287125" } }, { "category": "service_pack", "name": "17.3.7", "product": { "name": "17.3.7", "product_id": "CSAFPID-290671" } }, { "category": "service_pack", "name": "17.3.8", "product": { "name": "17.3.8", "product_id": "CSAFPID-295398" } } ], "category": "product_version", "name": "17.3" }, { "branches": [ { "category": "service_pack", "name": "17.4.1", "product": { "name": "17.4.1", "product_id": "CSAFPID-262588" } }, { "category": "service_pack", "name": "17.4.2", "product": { "name": "17.4.2", "product_id": "CSAFPID-278020" } }, { "category": "service_pack", "name": "17.4.1a", "product": { "name": "17.4.1a", "product_id": "CSAFPID-280770" } }, { "category": "service_pack", "name": "17.4.1b", "product": { "name": "17.4.1b", "product_id": "CSAFPID-280899" } }, { "category": "service_pack", "name": "17.4.1c", "product": { "name": "17.4.1c", "product_id": "CSAFPID-282116" } }, { "category": "service_pack", "name": "17.4.2a", "product": { "name": "17.4.2a", "product_id": "CSAFPID-285328" } } ], "category": "product_version", "name": "17.4" }, { "branches": [ { "category": "service_pack", "name": "17.5.1", "product": { "name": "17.5.1", "product_id": "CSAFPID-262590" } }, { "category": "service_pack", "name": "17.5.1a", "product": { "name": "17.5.1a", "product_id": "CSAFPID-282046" } }, { "category": "service_pack", "name": "17.5.1b", "product": { "name": "17.5.1b", "product_id": "CSAFPID-290596" } }, { "category": "service_pack", "name": "17.5.1c", "product": { "name": "17.5.1c", "product_id": "CSAFPID-292698" } } ], "category": "product_version", "name": "17.5" }, { "branches": [ { "category": "service_pack", "name": "17.6.1", "product": { "name": "17.6.1", "product_id": "CSAFPID-262592" } }, { "category": "service_pack", "name": "17.6.2", "product": { "name": "17.6.2", "product_id": "CSAFPID-282117" } }, { "category": "service_pack", "name": "17.6.1w", "product": { "name": "17.6.1w", "product_id": "CSAFPID-284161" } }, { "category": "service_pack", "name": "17.6.1a", "product": { "name": "17.6.1a", "product_id": "CSAFPID-284179" } }, { "category": "service_pack", "name": "17.6.1x", "product": { "name": "17.6.1x", "product_id": "CSAFPID-284740" } }, { "category": "service_pack", "name": "17.6.3", "product": { "name": "17.6.3", "product_id": "CSAFPID-286409" } }, { "category": "service_pack", "name": "17.6.1y", "product": { "name": "17.6.1y", "product_id": "CSAFPID-286477" } }, { "category": "service_pack", "name": "17.6.1z", "product": { "name": "17.6.1z", "product_id": "CSAFPID-286544" } }, { "category": "service_pack", "name": "17.6.3a", "product": { "name": "17.6.3a", "product_id": "CSAFPID-286594" } }, { "category": "service_pack", "name": "17.6.4", "product": { "name": "17.6.4", "product_id": "CSAFPID-287087" } }, { "category": "service_pack", "name": "17.6.1z1", "product": { "name": "17.6.1z1", "product_id": "CSAFPID-290565" } }, { "category": "service_pack", "name": "17.6.5", "product": { "name": "17.6.5", "product_id": "CSAFPID-290660" } }, { "category": "service_pack", "name": "17.6.6", "product": { "name": "17.6.6", "product_id": "CSAFPID-292656" } } ], "category": "product_version", "name": "17.6" }, { "branches": [ { "category": "service_pack", "name": "17.7.1", "product": { "name": "17.7.1", "product_id": "CSAFPID-277357" } }, { "category": "service_pack", "name": "17.7.1a", "product": { "name": "17.7.1a", "product_id": "CSAFPID-285329" } }, { "category": "service_pack", "name": "17.7.1b", "product": { "name": "17.7.1b", "product_id": "CSAFPID-286410" } }, { "category": "service_pack", "name": "17.7.2", "product": { "name": "17.7.2", "product_id": "CSAFPID-286534" } } ], "category": "product_version", "name": "17.7" }, { "branches": [ { "category": "service_pack", "name": "17.10.1", "product": { "name": "17.10.1", "product_id": "CSAFPID-278018" } }, { "category": "service_pack", "name": "17.10.1a", "product": { "name": "17.10.1a", "product_id": "CSAFPID-290580" } }, { "category": "service_pack", "name": "17.10.1b", "product": { "name": "17.10.1b", "product_id": "CSAFPID-292650" } } ], "category": "product_version", "name": "17.10" }, { "branches": [ { "category": "service_pack", "name": "17.8.1", "product": { "name": "17.8.1", "product_id": "CSAFPID-278023" } }, { "category": "service_pack", "name": "17.8.1a", "product": { "name": "17.8.1a", "product_id": "CSAFPID-286486" } } ], "category": "product_version", "name": "17.8" }, { "branches": [ { "category": "service_pack", "name": "17.9.1", "product": { "name": "17.9.1", "product_id": "CSAFPID-278025" } }, { "category": "service_pack", "name": "17.9.1w", "product": { "name": "17.9.1w", "product_id": "CSAFPID-286802" } }, { "category": "service_pack", "name": "17.9.2", "product": { "name": "17.9.2", "product_id": "CSAFPID-288221" } }, { "category": "service_pack", "name": "17.9.1a", "product": { "name": "17.9.1a", "product_id": "CSAFPID-288247" } }, { "category": "service_pack", "name": "17.9.1x", "product": { "name": "17.9.1x", "product_id": "CSAFPID-289372" } }, { "category": "service_pack", "name": "17.9.1y", "product": { "name": "17.9.1y", "product_id": "CSAFPID-290673" } }, { "category": "service_pack", "name": "17.9.3", "product": { "name": "17.9.3", "product_id": "CSAFPID-290674" } }, { "category": "service_pack", "name": "17.9.2a", "product": { "name": "17.9.2a", "product_id": "CSAFPID-290675" } }, { "category": "service_pack", "name": "17.9.1x1", "product": { "name": "17.9.1x1", "product_id": "CSAFPID-292876" } }, { "category": "service_pack", "name": "17.9.3a", "product": { "name": "17.9.3a", "product_id": "CSAFPID-295198" } }, { "category": "service_pack", "name": "17.9.4", "product": { "name": "17.9.4", "product_id": "CSAFPID-295412" } }, { "category": "service_pack", "name": "17.9.1y1", "product": { "name": "17.9.1y1", "product_id": "CSAFPID-299967" } } ], "category": "product_version", "name": "17.9" }, { "branches": [ { "category": "service_pack", "name": "17.11.1", "product": { "name": "17.11.1", "product_id": "CSAFPID-286799" } }, { "category": "service_pack", "name": "17.11.1a", "product": { "name": "17.11.1a", "product_id": "CSAFPID-294838" } } ], "category": "product_version", "name": "17.11" }, { "branches": [ { "category": "service_pack", "name": "17.12.1", "product": { "name": "17.12.1", "product_id": "CSAFPID-286801" } }, { "category": "service_pack", "name": "17.12.1a", "product": { "name": "17.12.1a", "product_id": "CSAFPID-300012" } } ], "category": "product_version", "name": "17.12" }, { "branches": [ { "category": "service_pack", "name": "17.11.99SW", "product": { "name": "17.11.99SW", "product_id": "CSAFPID-296860" } } ], "category": "product_version", "name": "17.11SW" } ], "category": "product_family", "name": "Cisco IOS XE Software" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20198", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwh87343" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-212436", "CSAFPID-213100", "CSAFPID-213809", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-218901", "CSAFPID-218903", "CSAFPID-218905", "CSAFPID-220802", "CSAFPID-222711", "CSAFPID-225784", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-226330", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-228706", "CSAFPID-229124", "CSAFPID-229187", "CSAFPID-231187", "CSAFPID-231389", "CSAFPID-231390", "CSAFPID-231667", "CSAFPID-231682", "CSAFPID-232008", "CSAFPID-232461", "CSAFPID-232767", "CSAFPID-233155", "CSAFPID-235307", "CSAFPID-235858", "CSAFPID-236834", "CSAFPID-236837", "CSAFPID-237460", "CSAFPID-239264", "CSAFPID-241736", "CSAFPID-242308", "CSAFPID-242834", "CSAFPID-243362", "CSAFPID-244070", "CSAFPID-244071", "CSAFPID-244530", "CSAFPID-244900", "CSAFPID-245375", "CSAFPID-245377", "CSAFPID-247629", "CSAFPID-248242", "CSAFPID-249171", "CSAFPID-250629", "CSAFPID-251075", "CSAFPID-251165", "CSAFPID-251166", "CSAFPID-251225", "CSAFPID-252045", "CSAFPID-252235", "CSAFPID-252271", "CSAFPID-252272", "CSAFPID-252913", "CSAFPID-252914", "CSAFPID-254688", "CSAFPID-254712", "CSAFPID-257955", "CSAFPID-257984", "CSAFPID-258170", "CSAFPID-258229", "CSAFPID-258388", "CSAFPID-258900", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262549", "CSAFPID-262588", "CSAFPID-262590", "CSAFPID-262592", "CSAFPID-262595", "CSAFPID-263804", "CSAFPID-264096", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-267605", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271798", "CSAFPID-271938", "CSAFPID-272047", "CSAFPID-272932", "CSAFPID-273112", "CSAFPID-273445", "CSAFPID-273448", "CSAFPID-273509", "CSAFPID-273563", "CSAFPID-273649", "CSAFPID-274818", "CSAFPID-274832", "CSAFPID-275538", "CSAFPID-276837", "CSAFPID-277099", "CSAFPID-277147", "CSAFPID-277148", "CSAFPID-277194", "CSAFPID-277255", "CSAFPID-277256", "CSAFPID-277321", "CSAFPID-277338", "CSAFPID-277343", "CSAFPID-277348", "CSAFPID-277357", "CSAFPID-277945", "CSAFPID-278002", "CSAFPID-278018", "CSAFPID-278019", "CSAFPID-278020", "CSAFPID-278023", "CSAFPID-278025", "CSAFPID-278402", "CSAFPID-278504", "CSAFPID-278881", "CSAFPID-279338", "CSAFPID-279339", "CSAFPID-280463", "CSAFPID-280555", "CSAFPID-280651", "CSAFPID-280652", "CSAFPID-280770", "CSAFPID-280783", "CSAFPID-280801", "CSAFPID-280899", "CSAFPID-280937", "CSAFPID-280938", "CSAFPID-280939", "CSAFPID-281320", "CSAFPID-281331", "CSAFPID-281438", "CSAFPID-281654", "CSAFPID-282017", "CSAFPID-282028", "CSAFPID-282046", "CSAFPID-282115", "CSAFPID-282116", "CSAFPID-282117", "CSAFPID-283831", "CSAFPID-283835", "CSAFPID-284161", "CSAFPID-284178", "CSAFPID-284179", "CSAFPID-284331", "CSAFPID-284740", "CSAFPID-285325", "CSAFPID-285326", "CSAFPID-285327", "CSAFPID-285328", "CSAFPID-285329", "CSAFPID-286031", "CSAFPID-286409", "CSAFPID-286410", "CSAFPID-286477", "CSAFPID-286486", "CSAFPID-286498", "CSAFPID-286534", "CSAFPID-286544", "CSAFPID-286594", "CSAFPID-286799", "CSAFPID-286801", "CSAFPID-286802", "CSAFPID-287087", "CSAFPID-287125", "CSAFPID-288221", "CSAFPID-288247", "CSAFPID-289372", "CSAFPID-290562", "CSAFPID-290565", "CSAFPID-290580", "CSAFPID-290596", "CSAFPID-290660", "CSAFPID-290669", "CSAFPID-290671", "CSAFPID-290673", "CSAFPID-290674", "CSAFPID-290675", "CSAFPID-292510", "CSAFPID-292650", "CSAFPID-292656", "CSAFPID-292698", "CSAFPID-292876", "CSAFPID-294838", "CSAFPID-295198", "CSAFPID-295398", "CSAFPID-295412", "CSAFPID-295421", "CSAFPID-296860", "CSAFPID-299967", "CSAFPID-300012" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-212436", "CSAFPID-213100", "CSAFPID-213809", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-218901", "CSAFPID-218903", "CSAFPID-218905", "CSAFPID-220802", "CSAFPID-222711", "CSAFPID-225784", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-226330", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-228706", "CSAFPID-229124", "CSAFPID-229187", "CSAFPID-231187", "CSAFPID-231389", "CSAFPID-231390", "CSAFPID-231667", "CSAFPID-231682", "CSAFPID-232008", "CSAFPID-232461", "CSAFPID-232767", "CSAFPID-233155", "CSAFPID-235307", "CSAFPID-235858", "CSAFPID-236834", "CSAFPID-236837", "CSAFPID-237460", "CSAFPID-239264", "CSAFPID-241736", "CSAFPID-242308", "CSAFPID-242834", "CSAFPID-243362", "CSAFPID-244070", "CSAFPID-244071", "CSAFPID-244530", "CSAFPID-244900", "CSAFPID-245375", "CSAFPID-245377", "CSAFPID-247629", "CSAFPID-248242", "CSAFPID-249171", "CSAFPID-250629", "CSAFPID-251075", "CSAFPID-251165", "CSAFPID-251166", "CSAFPID-251225", "CSAFPID-252045", "CSAFPID-252235", "CSAFPID-252271", "CSAFPID-252272", "CSAFPID-252913", "CSAFPID-252914", "CSAFPID-254688", "CSAFPID-254712", "CSAFPID-257955", "CSAFPID-257984", "CSAFPID-258170", "CSAFPID-258229", "CSAFPID-258388", "CSAFPID-258900", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262549", "CSAFPID-262588", "CSAFPID-262590", "CSAFPID-262592", "CSAFPID-262595", "CSAFPID-263804", "CSAFPID-264096", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-267605", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271798", "CSAFPID-271938", "CSAFPID-272047", "CSAFPID-272932", "CSAFPID-273112", "CSAFPID-273445", "CSAFPID-273448", "CSAFPID-273509", "CSAFPID-273563", "CSAFPID-273649", "CSAFPID-274818", "CSAFPID-274832", "CSAFPID-275538", "CSAFPID-276837", "CSAFPID-277099", "CSAFPID-277147", "CSAFPID-277148", "CSAFPID-277194", "CSAFPID-277255", "CSAFPID-277256", "CSAFPID-277321", "CSAFPID-277338", "CSAFPID-277343", "CSAFPID-277348", "CSAFPID-277357", "CSAFPID-277945", "CSAFPID-278002", "CSAFPID-278018", "CSAFPID-278019", "CSAFPID-278020", "CSAFPID-278023", "CSAFPID-278025", "CSAFPID-278402", "CSAFPID-278504", "CSAFPID-278881", "CSAFPID-279338", "CSAFPID-279339", "CSAFPID-280463", "CSAFPID-280555", "CSAFPID-280651", "CSAFPID-280652", "CSAFPID-280770", "CSAFPID-280783", "CSAFPID-280801", "CSAFPID-280899", "CSAFPID-280937", "CSAFPID-280938", "CSAFPID-280939", "CSAFPID-281320", "CSAFPID-281331", "CSAFPID-281438", "CSAFPID-281654", "CSAFPID-282017", "CSAFPID-282028", "CSAFPID-282046", "CSAFPID-282115", "CSAFPID-282116", "CSAFPID-282117", "CSAFPID-283831", "CSAFPID-283835", "CSAFPID-284161", "CSAFPID-284178", "CSAFPID-284179", "CSAFPID-284331", "CSAFPID-284740", "CSAFPID-285325", "CSAFPID-285326", "CSAFPID-285327", "CSAFPID-285328", "CSAFPID-285329", "CSAFPID-286031", "CSAFPID-286409", "CSAFPID-286410", "CSAFPID-286477", "CSAFPID-286486", "CSAFPID-286498", "CSAFPID-286534", "CSAFPID-286544", "CSAFPID-286594", "CSAFPID-286799", "CSAFPID-286801", "CSAFPID-286802", "CSAFPID-287087", "CSAFPID-287125", "CSAFPID-288221", "CSAFPID-288247", "CSAFPID-289372", "CSAFPID-290562", "CSAFPID-290565", "CSAFPID-290580", "CSAFPID-290596", "CSAFPID-290660", "CSAFPID-290669", "CSAFPID-290671", "CSAFPID-290673", "CSAFPID-290674", "CSAFPID-290675", "CSAFPID-292510", "CSAFPID-292650", "CSAFPID-292656", "CSAFPID-292698", "CSAFPID-292876", "CSAFPID-294838", "CSAFPID-295198", "CSAFPID-295398", "CSAFPID-295412", "CSAFPID-295421", "CSAFPID-296860", "CSAFPID-299967", "CSAFPID-300012" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-212436", "CSAFPID-213100", "CSAFPID-213809", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-218901", "CSAFPID-218903", "CSAFPID-218905", "CSAFPID-220802", "CSAFPID-222711", "CSAFPID-225784", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-226330", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-228706", "CSAFPID-229124", "CSAFPID-229187", "CSAFPID-231187", "CSAFPID-231389", "CSAFPID-231390", "CSAFPID-231667", "CSAFPID-231682", "CSAFPID-232008", "CSAFPID-232461", "CSAFPID-232767", "CSAFPID-233155", "CSAFPID-235307", "CSAFPID-235858", "CSAFPID-236834", "CSAFPID-236837", "CSAFPID-237460", "CSAFPID-239264", "CSAFPID-241736", "CSAFPID-242308", "CSAFPID-242834", "CSAFPID-243362", "CSAFPID-244070", "CSAFPID-244071", "CSAFPID-244530", "CSAFPID-244900", "CSAFPID-245375", "CSAFPID-245377", "CSAFPID-247629", "CSAFPID-248242", "CSAFPID-249171", "CSAFPID-250629", "CSAFPID-251075", "CSAFPID-251165", "CSAFPID-251166", "CSAFPID-251225", "CSAFPID-252045", "CSAFPID-252235", "CSAFPID-252271", "CSAFPID-252272", "CSAFPID-252913", "CSAFPID-252914", "CSAFPID-254688", "CSAFPID-254712", "CSAFPID-257955", "CSAFPID-257984", "CSAFPID-258170", "CSAFPID-258229", "CSAFPID-258388", "CSAFPID-258900", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262549", "CSAFPID-262588", "CSAFPID-262590", "CSAFPID-262592", "CSAFPID-262595", "CSAFPID-263804", "CSAFPID-264096", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-267605", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271798", "CSAFPID-271938", "CSAFPID-272047", "CSAFPID-272932", "CSAFPID-273112", "CSAFPID-273445", "CSAFPID-273448", "CSAFPID-273509", "CSAFPID-273563", "CSAFPID-273649", "CSAFPID-274818", "CSAFPID-274832", "CSAFPID-275538", "CSAFPID-276837", "CSAFPID-277099", "CSAFPID-277147", "CSAFPID-277148", "CSAFPID-277194", "CSAFPID-277255", "CSAFPID-277256", "CSAFPID-277321", "CSAFPID-277338", "CSAFPID-277343", "CSAFPID-277348", "CSAFPID-277357", "CSAFPID-277945", "CSAFPID-278002", "CSAFPID-278018", "CSAFPID-278019", "CSAFPID-278020", "CSAFPID-278023", "CSAFPID-278025", "CSAFPID-278402", "CSAFPID-278504", "CSAFPID-278881", "CSAFPID-279338", "CSAFPID-279339", "CSAFPID-280463", "CSAFPID-280555", "CSAFPID-280651", "CSAFPID-280652", "CSAFPID-280770", "CSAFPID-280783", "CSAFPID-280801", "CSAFPID-280899", "CSAFPID-280937", "CSAFPID-280938", "CSAFPID-280939", "CSAFPID-281320", "CSAFPID-281331", "CSAFPID-281438", "CSAFPID-281654", "CSAFPID-282017", "CSAFPID-282028", "CSAFPID-282046", "CSAFPID-282115", "CSAFPID-282116", "CSAFPID-282117", "CSAFPID-283831", "CSAFPID-283835", "CSAFPID-284161", "CSAFPID-284178", "CSAFPID-284179", "CSAFPID-284331", "CSAFPID-284740", "CSAFPID-285325", "CSAFPID-285326", "CSAFPID-285327", "CSAFPID-285328", "CSAFPID-285329", "CSAFPID-286031", "CSAFPID-286409", "CSAFPID-286410", "CSAFPID-286477", "CSAFPID-286486", "CSAFPID-286498", "CSAFPID-286534", "CSAFPID-286544", "CSAFPID-286594", "CSAFPID-286799", "CSAFPID-286801", "CSAFPID-286802", "CSAFPID-287087", "CSAFPID-287125", "CSAFPID-288221", "CSAFPID-288247", "CSAFPID-289372", "CSAFPID-290562", "CSAFPID-290565", "CSAFPID-290580", "CSAFPID-290596", "CSAFPID-290660", "CSAFPID-290669", "CSAFPID-290671", "CSAFPID-290673", "CSAFPID-290674", "CSAFPID-290675", "CSAFPID-292510", "CSAFPID-292650", "CSAFPID-292656", "CSAFPID-292698", "CSAFPID-292876", "CSAFPID-294838", "CSAFPID-295198", "CSAFPID-295398", "CSAFPID-295412", "CSAFPID-295421", "CSAFPID-296860", "CSAFPID-299967", "CSAFPID-300012" ] } ], "title": "Cisco IOS XE Software Web Management Interface Privilege Escalation Vulnerability" }, { "cve": "CVE-2023-20273", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwh87343" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-212436", "CSAFPID-213100", "CSAFPID-213809", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-218901", "CSAFPID-218903", "CSAFPID-218905", "CSAFPID-220802", "CSAFPID-222711", "CSAFPID-225784", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-226330", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-228706", "CSAFPID-229124", "CSAFPID-229187", "CSAFPID-231187", "CSAFPID-231389", "CSAFPID-231390", "CSAFPID-231667", "CSAFPID-231682", "CSAFPID-232008", "CSAFPID-232461", "CSAFPID-232767", "CSAFPID-233155", "CSAFPID-235307", "CSAFPID-235858", "CSAFPID-236834", "CSAFPID-236837", "CSAFPID-237460", "CSAFPID-239264", "CSAFPID-241736", "CSAFPID-242308", "CSAFPID-242834", "CSAFPID-243362", "CSAFPID-244070", "CSAFPID-244071", "CSAFPID-244530", "CSAFPID-244900", "CSAFPID-245375", "CSAFPID-245377", "CSAFPID-247629", "CSAFPID-248242", "CSAFPID-249171", "CSAFPID-250629", "CSAFPID-251075", "CSAFPID-251165", "CSAFPID-251166", "CSAFPID-251225", "CSAFPID-252045", "CSAFPID-252235", "CSAFPID-252271", "CSAFPID-252272", "CSAFPID-252913", "CSAFPID-252914", "CSAFPID-254688", "CSAFPID-254712", "CSAFPID-257955", "CSAFPID-257984", "CSAFPID-258170", "CSAFPID-258229", "CSAFPID-258388", "CSAFPID-258900", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262549", "CSAFPID-262588", "CSAFPID-262590", "CSAFPID-262592", "CSAFPID-262595", "CSAFPID-263804", "CSAFPID-264096", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-267605", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271798", "CSAFPID-271938", "CSAFPID-272047", "CSAFPID-272932", "CSAFPID-273112", "CSAFPID-273445", "CSAFPID-273448", "CSAFPID-273509", "CSAFPID-273563", "CSAFPID-273649", "CSAFPID-274818", "CSAFPID-274832", "CSAFPID-275538", "CSAFPID-276837", "CSAFPID-277099", "CSAFPID-277147", "CSAFPID-277148", "CSAFPID-277194", "CSAFPID-277255", "CSAFPID-277256", "CSAFPID-277321", "CSAFPID-277338", "CSAFPID-277343", "CSAFPID-277348", "CSAFPID-277357", "CSAFPID-277945", "CSAFPID-278002", "CSAFPID-278018", "CSAFPID-278019", "CSAFPID-278020", "CSAFPID-278023", "CSAFPID-278025", "CSAFPID-278402", "CSAFPID-278504", "CSAFPID-278881", "CSAFPID-279338", "CSAFPID-279339", "CSAFPID-280463", "CSAFPID-280555", "CSAFPID-280651", "CSAFPID-280652", "CSAFPID-280770", "CSAFPID-280783", "CSAFPID-280801", "CSAFPID-280899", "CSAFPID-280937", "CSAFPID-280938", "CSAFPID-280939", "CSAFPID-281320", "CSAFPID-281331", "CSAFPID-281438", "CSAFPID-281654", "CSAFPID-282017", "CSAFPID-282028", "CSAFPID-282046", "CSAFPID-282115", "CSAFPID-282116", "CSAFPID-282117", "CSAFPID-283831", "CSAFPID-283835", "CSAFPID-284161", "CSAFPID-284178", "CSAFPID-284179", "CSAFPID-284331", "CSAFPID-284740", "CSAFPID-285325", "CSAFPID-285326", "CSAFPID-285327", "CSAFPID-285328", "CSAFPID-285329", "CSAFPID-286031", "CSAFPID-286409", "CSAFPID-286410", "CSAFPID-286477", "CSAFPID-286486", "CSAFPID-286498", "CSAFPID-286534", "CSAFPID-286544", "CSAFPID-286594", "CSAFPID-286799", "CSAFPID-286801", "CSAFPID-286802", "CSAFPID-287087", "CSAFPID-287125", "CSAFPID-288221", "CSAFPID-288247", "CSAFPID-289372", "CSAFPID-290562", "CSAFPID-290565", "CSAFPID-290580", "CSAFPID-290596", "CSAFPID-290660", "CSAFPID-290669", "CSAFPID-290671", "CSAFPID-290673", "CSAFPID-290674", "CSAFPID-290675", "CSAFPID-292510", "CSAFPID-292650", "CSAFPID-292656", "CSAFPID-292698", "CSAFPID-292876", "CSAFPID-294838", "CSAFPID-295198", "CSAFPID-295398", "CSAFPID-295412", "CSAFPID-295421", "CSAFPID-296860", "CSAFPID-299967", "CSAFPID-300012" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-212436", "CSAFPID-213100", "CSAFPID-213809", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-218901", "CSAFPID-218903", "CSAFPID-218905", "CSAFPID-220802", "CSAFPID-222711", "CSAFPID-225784", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-226330", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-228706", "CSAFPID-229124", "CSAFPID-229187", "CSAFPID-231187", "CSAFPID-231389", "CSAFPID-231390", "CSAFPID-231667", "CSAFPID-231682", "CSAFPID-232008", "CSAFPID-232461", "CSAFPID-232767", "CSAFPID-233155", "CSAFPID-235307", "CSAFPID-235858", "CSAFPID-236834", "CSAFPID-236837", "CSAFPID-237460", "CSAFPID-239264", "CSAFPID-241736", "CSAFPID-242308", "CSAFPID-242834", "CSAFPID-243362", "CSAFPID-244070", "CSAFPID-244071", "CSAFPID-244530", "CSAFPID-244900", "CSAFPID-245375", "CSAFPID-245377", "CSAFPID-247629", "CSAFPID-248242", "CSAFPID-249171", "CSAFPID-250629", "CSAFPID-251075", "CSAFPID-251165", "CSAFPID-251166", "CSAFPID-251225", "CSAFPID-252045", "CSAFPID-252235", "CSAFPID-252271", "CSAFPID-252272", "CSAFPID-252913", "CSAFPID-252914", "CSAFPID-254688", "CSAFPID-254712", "CSAFPID-257955", "CSAFPID-257984", "CSAFPID-258170", "CSAFPID-258229", "CSAFPID-258388", "CSAFPID-258900", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262549", "CSAFPID-262588", "CSAFPID-262590", "CSAFPID-262592", "CSAFPID-262595", "CSAFPID-263804", "CSAFPID-264096", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-267605", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271798", "CSAFPID-271938", "CSAFPID-272047", "CSAFPID-272932", "CSAFPID-273112", "CSAFPID-273445", "CSAFPID-273448", "CSAFPID-273509", "CSAFPID-273563", "CSAFPID-273649", "CSAFPID-274818", "CSAFPID-274832", "CSAFPID-275538", "CSAFPID-276837", "CSAFPID-277099", "CSAFPID-277147", "CSAFPID-277148", "CSAFPID-277194", "CSAFPID-277255", "CSAFPID-277256", "CSAFPID-277321", "CSAFPID-277338", "CSAFPID-277343", "CSAFPID-277348", "CSAFPID-277357", "CSAFPID-277945", "CSAFPID-278002", "CSAFPID-278018", "CSAFPID-278019", "CSAFPID-278020", "CSAFPID-278023", "CSAFPID-278025", "CSAFPID-278402", "CSAFPID-278504", "CSAFPID-278881", "CSAFPID-279338", "CSAFPID-279339", "CSAFPID-280463", "CSAFPID-280555", "CSAFPID-280651", "CSAFPID-280652", "CSAFPID-280770", "CSAFPID-280783", "CSAFPID-280801", "CSAFPID-280899", "CSAFPID-280937", "CSAFPID-280938", "CSAFPID-280939", "CSAFPID-281320", "CSAFPID-281331", "CSAFPID-281438", "CSAFPID-281654", "CSAFPID-282017", "CSAFPID-282028", "CSAFPID-282046", "CSAFPID-282115", "CSAFPID-282116", "CSAFPID-282117", "CSAFPID-283831", "CSAFPID-283835", "CSAFPID-284161", "CSAFPID-284178", "CSAFPID-284179", "CSAFPID-284331", "CSAFPID-284740", "CSAFPID-285325", "CSAFPID-285326", "CSAFPID-285327", "CSAFPID-285328", "CSAFPID-285329", "CSAFPID-286031", "CSAFPID-286409", "CSAFPID-286410", "CSAFPID-286477", "CSAFPID-286486", "CSAFPID-286498", "CSAFPID-286534", "CSAFPID-286544", "CSAFPID-286594", "CSAFPID-286799", "CSAFPID-286801", "CSAFPID-286802", "CSAFPID-287087", "CSAFPID-287125", "CSAFPID-288221", "CSAFPID-288247", "CSAFPID-289372", "CSAFPID-290562", "CSAFPID-290565", "CSAFPID-290580", "CSAFPID-290596", "CSAFPID-290660", "CSAFPID-290669", "CSAFPID-290671", "CSAFPID-290673", "CSAFPID-290674", "CSAFPID-290675", "CSAFPID-292510", "CSAFPID-292650", "CSAFPID-292656", "CSAFPID-292698", "CSAFPID-292876", "CSAFPID-294838", "CSAFPID-295198", "CSAFPID-295398", "CSAFPID-295412", "CSAFPID-295421", "CSAFPID-296860", "CSAFPID-299967", "CSAFPID-300012" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-212436", "CSAFPID-213100", "CSAFPID-213809", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-218901", "CSAFPID-218903", "CSAFPID-218905", "CSAFPID-220802", "CSAFPID-222711", "CSAFPID-225784", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-226330", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-228706", "CSAFPID-229124", "CSAFPID-229187", "CSAFPID-231187", "CSAFPID-231389", "CSAFPID-231390", "CSAFPID-231667", "CSAFPID-231682", "CSAFPID-232008", "CSAFPID-232461", "CSAFPID-232767", "CSAFPID-233155", "CSAFPID-235307", "CSAFPID-235858", "CSAFPID-236834", "CSAFPID-236837", "CSAFPID-237460", "CSAFPID-239264", "CSAFPID-241736", "CSAFPID-242308", "CSAFPID-242834", "CSAFPID-243362", "CSAFPID-244070", "CSAFPID-244071", "CSAFPID-244530", "CSAFPID-244900", "CSAFPID-245375", "CSAFPID-245377", "CSAFPID-247629", "CSAFPID-248242", "CSAFPID-249171", "CSAFPID-250629", "CSAFPID-251075", "CSAFPID-251165", "CSAFPID-251166", "CSAFPID-251225", "CSAFPID-252045", "CSAFPID-252235", "CSAFPID-252271", "CSAFPID-252272", "CSAFPID-252913", "CSAFPID-252914", "CSAFPID-254688", "CSAFPID-254712", "CSAFPID-257955", "CSAFPID-257984", "CSAFPID-258170", "CSAFPID-258229", "CSAFPID-258388", "CSAFPID-258900", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262549", "CSAFPID-262588", "CSAFPID-262590", "CSAFPID-262592", "CSAFPID-262595", "CSAFPID-263804", "CSAFPID-264096", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-267605", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271798", "CSAFPID-271938", "CSAFPID-272047", "CSAFPID-272932", "CSAFPID-273112", "CSAFPID-273445", "CSAFPID-273448", "CSAFPID-273509", "CSAFPID-273563", "CSAFPID-273649", "CSAFPID-274818", "CSAFPID-274832", "CSAFPID-275538", "CSAFPID-276837", "CSAFPID-277099", "CSAFPID-277147", "CSAFPID-277148", "CSAFPID-277194", "CSAFPID-277255", "CSAFPID-277256", "CSAFPID-277321", "CSAFPID-277338", "CSAFPID-277343", "CSAFPID-277348", "CSAFPID-277357", "CSAFPID-277945", "CSAFPID-278002", "CSAFPID-278018", "CSAFPID-278019", "CSAFPID-278020", "CSAFPID-278023", "CSAFPID-278025", "CSAFPID-278402", "CSAFPID-278504", "CSAFPID-278881", "CSAFPID-279338", "CSAFPID-279339", "CSAFPID-280463", "CSAFPID-280555", "CSAFPID-280651", "CSAFPID-280652", "CSAFPID-280770", "CSAFPID-280783", "CSAFPID-280801", "CSAFPID-280899", "CSAFPID-280937", "CSAFPID-280938", "CSAFPID-280939", "CSAFPID-281320", "CSAFPID-281331", "CSAFPID-281438", "CSAFPID-281654", "CSAFPID-282017", "CSAFPID-282028", "CSAFPID-282046", "CSAFPID-282115", "CSAFPID-282116", "CSAFPID-282117", "CSAFPID-283831", "CSAFPID-283835", "CSAFPID-284161", "CSAFPID-284178", "CSAFPID-284179", "CSAFPID-284331", "CSAFPID-284740", "CSAFPID-285325", "CSAFPID-285326", "CSAFPID-285327", "CSAFPID-285328", "CSAFPID-285329", "CSAFPID-286031", "CSAFPID-286409", "CSAFPID-286410", "CSAFPID-286477", "CSAFPID-286486", "CSAFPID-286498", "CSAFPID-286534", "CSAFPID-286544", "CSAFPID-286594", "CSAFPID-286799", "CSAFPID-286801", "CSAFPID-286802", "CSAFPID-287087", "CSAFPID-287125", "CSAFPID-288221", "CSAFPID-288247", "CSAFPID-289372", "CSAFPID-290562", "CSAFPID-290565", "CSAFPID-290580", "CSAFPID-290596", "CSAFPID-290660", "CSAFPID-290669", "CSAFPID-290671", "CSAFPID-290673", "CSAFPID-290674", "CSAFPID-290675", "CSAFPID-292510", "CSAFPID-292650", "CSAFPID-292656", "CSAFPID-292698", "CSAFPID-292876", "CSAFPID-294838", "CSAFPID-295198", "CSAFPID-295398", "CSAFPID-295412", "CSAFPID-295421", "CSAFPID-296860", "CSAFPID-299967", "CSAFPID-300012" ] } ], "title": "Cisco IOS XE Software Web UI Command Injection Vulnerability" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.