PT-2023-6168 · Cisco · Cisco Ios Xe
Published
2023-10-16
·
Updated
2026-03-05
·
CVE-2023-20198
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco IOS XE Software versions prior to a patch (affected versions not specified)
Description
Cisco is aware of active exploitation of a critical, unauthenticated remote code execution vulnerability (CVE-2023-20198) in the web UI feature of Cisco IOS XE Software. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access, effectively enabling complete system takeover. The vulnerability is actively exploited in the wild, with over 40,000 devices reportedly compromised. Threat actors, including the China-linked Salt Typhoon group, have exploited this flaw to gain access to systems, steal configuration files, and establish tunnels for data exfiltration. The vulnerability has been exploited in attacks targeting Canadian telecommunications providers. A public exploit code is available. Indicators of compromise include the presence of a malicious implant and the creation of a user account named “cisco support”. The vulnerability is rated with a CVSS score of 10.0.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
RCE
Improper Privilege Management
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2023-06875
CVE-2023-20198
Affected Products
Cisco Ios Xe
References · 541
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/cisco_ios_xe_rce.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cisco_ios_xe_os_exec_cve_2023_20273.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cisco_ios_xe_cli_exec_cve_2023_20198.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/W01fh4cker/CVE-2023-20198-RCE⭐ 37 🔗 10 · Exploit
- 🔥 https://github.com/smokeintheshell/CVE-2023-20198⭐ 40 🔗 7 · Exploit
- 🔥 https://github.com/fox-it/cisco-ios-xe-implant-detection⭐ 36 🔗 8 · Exploit
- 🔥 https://github.com/ZephrFish/Cisco-IOS-XE-Scanner⭐ 31 🔗 11 · Exploit
- 🔥 https://github.com/ZephrFish/CVE-2023-20198-Checker⭐ 31 🔗 11 · Exploit
- 🔥 https://github.com/Shadow0ps/CVE-2023-20198-Scanner⭐ 30 🔗 6 · Exploit
- 🔥 https://github.com/Atea-Redteam/CVE-2023-20198⭐ 17 🔗 14 · Exploit
- 🔥 https://github.com/Pushkarup/CVE-2023-20198⭐ 8 🔗 7 · Exploit
- 🔥 https://github.com/Tounsi007/CVE-2023-20198⭐ 9 🔗 6 · Exploit
- 🔥 https://github.com/cert-orangecyberdefense/Cisco_CVE-2023-20198⭐ 9 🔗 3 · Exploit
- 🔥 https://github.com/RevoltSecurities/CVE-2023-20198⭐ 6 🔗 3 · Exploit
- 🔥 https://github.com/iveresk/cve-2023-20198⭐ 4 🔗 4 · Exploit