Exploit Released for Cisco IOS XE Zero-day Vulnerability

by Esmeralda McKenzie
Exploit Released for Cisco IOS XE Zero-day Vulnerability

Exploit Released for Cisco IOS XE Zero-day Vulnerability

Exploit Cisco IOS Zero-day

Cisco became as soon as reported with a serious vulnerability final week, which has been actively exploited by menace actors within the wild. The vulnerability became as soon as assigned with the CVE-2023-20198 and became as soon as given a severity rating of 10.0 (Serious).

This particular vulnerability affects Cisco IOS XE machine installed in hundreds of Cisco gadgets, including routers, switches, and necessary of other networking gadgets. Nonetheless, Cisco has patched this vulnerability and has launched a security advisory.

EHA

CVE-2023-20198: Authentication Bypass in Cisco IOS XE Web UI

This vulnerability exists within the Web UI of Cisco IOS Xe, which is able to permit an unauthenticated menace actor to elevate their privileges and impact an myth on an affected machine with privilege diploma 15 find admission to (Limitless find admission to).

This contemporary myth will provide complete possess watch over over the machine to the menace actor, after which arbitrary commands will also be accomplished. The severity for this vulnerability has been given as 10.0 (Serious).

Exploit PoC

The menace actor must reach the webui_wsma_http or webui_wsma_https endpoints by some means as a prerequisite. Put up this, they’ll craft a malicious POST question with the endpoint /%2577ebui_wsma_HTTP that bypasses the Nginx fits to reach the WMSA provider in iosd.

Exploit HTTP question (Source: Horizon3)

The WSMA (Web Providers and products Management Agent) also permits users to manufacture commands and configure the machine by map of SOAP requests. Per Cisco’s documentation, SOAP requests will also be traditional to find admission to the configuration characteristic.

Furthermore, this provider can also also impact a recent particular person with privilege diploma 15 by sending the CLI relate username privilege 15 secret . To substantiate the exploitation, the Administration -> Individual Administration panel within the UI will also be traditional to gaze the contemporary particular person.

A complete document about this proof-of-belief has been revealed by Horizon3, which presents detailed details about the exploit theory, map of exploitation, and other crucial parts.

To repair this vulnerability, Cisco has applied a Proxy-Uri-Source header added within the patch, which prevents menace actors from accessing the WSMA provider. The default header value has been position to world and to webui_internal for legitimate requests.

Mounted in Free up

Cisco IOS XE Tool Free up Practice First Mounted Free up Available
17.9 17.9.4a Yes
17.6 17.6.6a Yes
17.3 17.3.8a TBD
16.12 (Catalyst 3650 and 3850 absolute most life like) 16.12.10a Yes

Source: Cisco

It is urged that users of Cisco gadgets with Cisco IOS XE machine upgrade to the most modern model to spoil this vulnerability from getting exploited.

Source credit : cybersecuritynews.com

Related Posts