PT-2023-6168 · Cisco · Cisco Ios Xe

Published

2023-10-16

·

Updated

2026-03-05

·

CVE-2023-20198

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Cisco IOS XE Software versions prior to a patch (affected versions not specified)
Description Cisco is aware of active exploitation of a critical, unauthenticated remote code execution vulnerability (CVE-2023-20198) in the web UI feature of Cisco IOS XE Software. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access, effectively enabling complete system takeover. The vulnerability is actively exploited in the wild, with over 40,000 devices reportedly compromised. Threat actors, including the China-linked Salt Typhoon group, have exploited this flaw to gain access to systems, steal configuration files, and establish tunnels for data exfiltration. The vulnerability has been exploited in attacks targeting Canadian telecommunications providers. A public exploit code is available. Indicators of compromise include the presence of a malicious implant and the creation of a user account named “cisco support”. The vulnerability is rated with a CVSS score of 10.0.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

Improper Privilege Management

Weakness Enumeration

Related Identifiers

BDU:2023-06875
CVE-2023-20198

Affected Products

Cisco Ios Xe