PT-2023-6168 · Cisco · Cisco Ios Xe
Published
2023-10-16
·
Updated
2025-09-25
·
CVE-2023-20198
CVSS v3.1
10
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco IOS XE (affected versions not specified)
Description
The vulnerability in Cisco IOS XE allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access, effectively enabling a complete takeover of the system. This issue is actively being exploited in the wild, with tens of thousands of devices reportedly compromised. The vulnerability is related to the web UI feature of Cisco IOS XE Software when exposed to the internet or untrusted networks.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability. As a temporary workaround, consider disabling the web UI feature on all internet-facing systems or untrusted networks to minimize the risk of exploitation. Restrict access to the web UI to only trusted networks and users. Monitor for malicious activity and report findings to the relevant authorities. Apply the recommended mitigations from Cisco, such as disabling the HTTP Server feature, to reduce the risk of exploitation.
Exploit
RCE
Improper Privilege Management
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2023-06875
CVE-2023-20198
Affected Products
Cisco Ios Xe
References · 519
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cisco_ios_xe_os_exec_cve_2023_20273.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/cisco_ios_xe_rce.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cisco_ios_xe_cli_exec_cve_2023_20198.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/smokeintheshell/CVE-2023-20198⭐ 40 🔗 7 · Exploit
- 🔥 https://github.com/W01fh4cker/CVE-2023-20198-RCE⭐ 37 🔗 10 · Exploit
- 🔥 https://github.com/fox-it/cisco-ios-xe-implant-detection⭐ 36 🔗 8 · Exploit
- 🔥 https://github.com/ZephrFish/CVE-2023-20198-Checker⭐ 31 🔗 11 · Exploit
- 🔥 https://github.com/ZephrFish/Cisco-IOS-XE-Scanner⭐ 31 🔗 11 · Exploit
- 🔥 https://github.com/Shadow0ps/CVE-2023-20198-Scanner⭐ 30 🔗 6 · Exploit
- 🔥 https://github.com/Atea-Redteam/CVE-2023-20198⭐ 17 🔗 14 · Exploit
- 🔥 https://github.com/Pushkarup/CVE-2023-20198⭐ 8 🔗 7 · Exploit
- 🔥 https://github.com/Tounsi007/CVE-2023-20198⭐ 9 🔗 6 · Exploit
- 🔥 https://github.com/cert-orangecyberdefense/Cisco_CVE-2023-20198⭐ 9 🔗 3 · Exploit
- 🔥 https://github.com/RevoltSecurities/CVE-2023-20198⭐ 6 🔗 3 · Exploit
- 🔥 https://github.com/iveresk/cve-2023-20198⭐ 4 🔗 4 · Exploit