PT-2023-6168 · Cisco · Cisco Ios Xe
Published
2023-10-16
·
Updated
2025-11-29
·
CVE-2023-20198
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco IOS XE Software versions prior to patch availability.
Description
Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. This allows the attacker to gain full control of the system. The vulnerability is tracked as CVE-2023-20198 and has a CVSS score of 10.0. The vulnerability has been actively exploited, with over 40,000 devices compromised. Threat actors, including the China-linked Salt Typhoon group, have exploited this vulnerability to breach telecommunications companies, retrieve configuration files, and establish GRE tunnels for data exfiltration. A Lua-based web shell, known as BADCANDY, is being used to maintain persistence even after reboots. The vulnerability affects devices with the Web UI feature enabled.
Recommendations
Disable the HTTP Server feature on all internet-facing systems.
Exploit
Fix
RCE
Improper Privilege Management
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2023-06875
CVE-2023-20198
Affected Products
Cisco Ios Xe
References · 541
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cisco_ios_xe_os_exec_cve_2023_20273.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/cisco_ios_xe_rce.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cisco_ios_xe_cli_exec_cve_2023_20198.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/smokeintheshell/CVE-2023-20198⭐ 40 🔗 7 · Exploit
- 🔥 https://github.com/W01fh4cker/CVE-2023-20198-RCE⭐ 37 🔗 10 · Exploit
- 🔥 https://github.com/fox-it/cisco-ios-xe-implant-detection⭐ 36 🔗 8 · Exploit
- 🔥 https://github.com/ZephrFish/CVE-2023-20198-Checker⭐ 31 🔗 11 · Exploit
- 🔥 https://github.com/ZephrFish/Cisco-IOS-XE-Scanner⭐ 31 🔗 11 · Exploit
- 🔥 https://github.com/Shadow0ps/CVE-2023-20198-Scanner⭐ 30 🔗 6 · Exploit
- 🔥 https://github.com/Atea-Redteam/CVE-2023-20198⭐ 17 🔗 14 · Exploit
- 🔥 https://github.com/Pushkarup/CVE-2023-20198⭐ 8 🔗 7 · Exploit
- 🔥 https://github.com/Tounsi007/CVE-2023-20198⭐ 9 🔗 6 · Exploit
- 🔥 https://github.com/cert-orangecyberdefense/Cisco_CVE-2023-20198⭐ 9 🔗 3 · Exploit
- 🔥 https://github.com/RevoltSecurities/CVE-2023-20198⭐ 6 🔗 3 · Exploit
- 🔥 https://github.com/iveresk/cve-2023-20198⭐ 4 🔗 4 · Exploit