CVE-2023-20198
📋 TL;DR
CVE-2023-20198 is a critical vulnerability in Cisco IOS XE Software web UI that allows unauthenticated attackers to gain initial access and create local user accounts. Combined with CVE-2023-20273, attackers can escalate privileges to root and install persistent implants. This affects organizations running vulnerable versions of Cisco IOS XE Software with the web UI enabled.
💻 Affected Systems
- Cisco IOS XE Software
📦 What is this software?
Allen Bradley Stratix 5200 Firmware by Rockwellautomation
View all CVEs affecting Allen Bradley Stratix 5200 Firmware →
Allen Bradley Stratix 5800 Firmware by Rockwellautomation
View all CVEs affecting Allen Bradley Stratix 5800 Firmware →
Ios Xe by Cisco
Cisco IOS XE is Cisco's modern network operating system running on enterprise routers, switches, and wireless controllers deployed across corporate networks, data centers, branch offices, and service provider infrastructure worldwide. As the evolution of Cisco IOS, IOS XE provides a Linux-based modu...
Learn more about Ios Xe →Ios Xe by Cisco
Cisco IOS XE is Cisco's modern network operating system running on enterprise routers, switches, and wireless controllers deployed across corporate networks, data centers, branch offices, and service provider infrastructure worldwide. As the evolution of Cisco IOS, IOS XE provides a Linux-based modu...
Learn more about Ios Xe →Ios Xe by Cisco
Cisco IOS XE is Cisco's modern network operating system running on enterprise routers, switches, and wireless controllers deployed across corporate networks, data centers, branch offices, and service provider infrastructure worldwide. As the evolution of Cisco IOS, IOS XE provides a Linux-based modu...
Learn more about Ios Xe →Ios Xe by Cisco
Cisco IOS XE is Cisco's modern network operating system running on enterprise routers, switches, and wireless controllers deployed across corporate networks, data centers, branch offices, and service provider infrastructure worldwide. As the evolution of Cisco IOS, IOS XE provides a Linux-based modu...
Learn more about Ios Xe →⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level access, persistent backdoor installation, network infrastructure takeover, and data exfiltration.
Likely Case
Initial access leading to privilege escalation, implant deployment, and potential lateral movement within the network.
If Mitigated
Limited impact if web UI is disabled or proper network segmentation isolates affected devices.
🎯 Exploit Status
Actively exploited in the wild. Attack chain involves CVE-2023-20198 for initial access and CVE-2023-20273 for privilege escalation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Cisco advisory for specific fixed releases
Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
Restart Required: Yes
Instructions:
1. Check current IOS XE version. 2. Review Cisco advisory for fixed releases. 3. Download and apply appropriate patch. 4. Reboot device. 5. Verify patch installation.
🔧 Temporary Workarounds
Disable Web UI
allDisable the vulnerable web UI feature to prevent exploitation
no ip http server
no ip http secure-server
Restrict Access
allLimit web UI access to trusted networks using ACLs
ip http access-class <ACL-NUMBER>
ip http secure-server access-class <ACL-NUMBER>
🧯 If You Can't Patch
- Immediately disable web UI using 'no ip http server' and 'no ip http secure-server' commands
- Implement strict network segmentation to isolate affected devices from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check if web UI is enabled: 'show running-config | include ip http' and verify IOS XE version against affected versions in Cisco advisory
Check Version:
show version
Verify Fix Applied:
Verify patch installation: 'show version' and confirm version matches fixed release. Check for implant indicators: 'show running-config | include username' for suspicious users
📡 Detection & Monitoring
Log Indicators:
- Unexpected user account creation
- Privilege escalation attempts
- Web UI authentication bypass logs
- Implant-related file system modifications
Network Indicators:
- Unusual HTTP/HTTPS traffic to device web UI
- Suspicious command execution patterns
- Outbound connections from network devices to unknown IPs
SIEM Query:
Search for: 'CVE-2023-20198', 'CVE-2023-20273', 'Cisco IOS XE web UI exploitation', 'privilege 15 command execution', 'local user creation on network devices'
🔗 References
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-20198