On October 16, 2023, Cisco reported two new vulnerabilities in the web UI for its Cisco IOS XE operating system that runs many of its routers and switches, CVE-2023-20198 and CVE-2023-20273. These vulnerabilities were initially being exploited by unknown hackers and affected more than 10,000 devices at the time of its first known existence. However, in the following days the attack was leveraged to affect more than 50,000 devices, and that’s when a free software fix was identified by Cisco to keep a check on devices. Cisco released the updated version 17.9.4a on October 23 to fix the issue. The software is available for download from Cisco’s Software Download Center.
Both vulnerabilities affect IOS XE Software and largely exploit the Web UI of Cisco Devices. The CVE-2023-20198 received maximum severity rating (10/10) while CVE-2023-20273 has been assigned a high severity rating of 7.2.
As per Cisco, attackers gained initial access to devices by exploiting CVE-2023-20198 and creating an implant. An implant is malicious code or script that can be installed on a device to execute arbitrary commands or gain unauthorized access. After exploiting CVE-2023-20273, the implant user is granted the highest privilege to issue level 15 commands. On Cisco devices, privileges are classified on a scale of 0 to 15, with 0 being the lowest level and 15 granting administrator level privileges. With this highest privilege level, the adversary can practically do anything to cause harm to the network or plant any script (such as a backdoor, or malicious code) to periodically monitor and use the device entry point to further escalate the attack scope. However, the implant doesn’t persist when the system is rebooted. Cisco has not provided guidance whether any devices are implanted with script or code that could persist.
Cisco recommends that the administrator checks if the access to Web UI is active by issuing the appropriate Cisco-issued command. If found active, the vendor advises to limit access to the interface or render it inactive if possible.
Versa Networks customers can receive protection from the Cisco IOS XE Web UI Vulnerability in the following ways:
[1] https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/
[2] https://www.cisa.gov/guidance-addressing-cisco-ios-xe-web-ui-vulnerabilities
Subscribe to the Versa Blog
Gartner Research Report