{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2023-078.pdf"
    },
    "title": "Cisco IOS XE Software Web UI Privilege Escalation Vulnerability",
    "serial_number": "2023-078",
    "publish_date": "23-10-2023 11:37:47",
    "description": "On October 16 2023, Cisco published an advisory regarding a critical vulnerability, CVE-2023-20198, affecting the Web UI of Cisco IOS XE Software. This vulnerability could allow an unauthenticated remote attacker to create a privileged level 15 account, granting them control over the affected system.<br>\n[UPDATE] On October 20 2023, Cisco identified an additional vulnerability CVE-2023-20273, which, when exploited, affects another component of the web UI feature. This vulnerability allows the new local user to elevate its privilege to root and write an implant to the file system.<br>\n- CVE-2023-20198 has been assigned a CVSS Score of 10.0.<br>\n- CVE-2023-20273 has been assigned a CVSS Score of 7.2.<br>\nCisco has released software updates that address the vulnerabilities described in this advisory. It is also advised to implement the recommendations.<br>\n",
    "url_title": "2023-078",
    "content_markdown": "---\ntitle: 'Cisco IOS XE Software Web UI Privilege Escalation Vulnerability'\nnumber: '2023-078'\nversion: '1.1'\noriginal_date: 'October 16, 2023'\ndate: 'October 17, 2023'\n---\n\n_History:_\n\n* _17/10/2023 --- v1.0 -- Initial publication_\n* _23/10/2023 --- v.1.1 -- Added information about a new vulnerability and available updates_\n\n# Summary\n\nOn October 16 2023, Cisco published an advisory regarding a critical vulnerability, **CVE-2023-20198**, affecting the Web UI of Cisco IOS XE Software. This vulnerability could allow an unauthenticated remote attacker to create a privileged level 15 account, granting them control over the affected system.\n\n**[UPDATE]** On October 20 2023, Cisco identified an additional vulnerability **CVE-2023-20273**, which, when exploited, affects another component of the web UI feature. This vulnerability allows the new local user to elevate its privilege to root and write an implant to the file system. [1]\n\n- **CVE-2023-20198** has been assigned a CVSS Score of 10.0.\n- **CVE-2023-20273** has been assigned a CVSS Score of 7.2.\n\nCisco has released software updates that address the vulnerabilities described in this advisory [1]. It is also advised to implement the recommendations.\n\n# Technical Details\n\nThe vulnerability `CVE-2023-20198` allows a remote, unauthenticated attacker to exploit the web UI feature of Cisco IOS XE Software, enabling them to create an account with privilege level 15 access.\n\nThe vulnerability `CVE-2023-20273` allows the new local user to elevate its privilege to root and write an implant to the file system.\n\n# Affected Products\n\nThis vulnerability affects Cisco IOS XE Software if the web UI feature is enabled. The web UI feature is enabled through the `ip http server` or `ip http secure-server` commands [1].\n\nTo check if the web UI feature is enabled, look for `ip http server` and `ip http secure-server` in the system configuration.\n\n# Detection\n\nTo determine whether a system may have been compromised, perform the following checks [1]:\n\nCheck the system logs for the presence of any of the following log messages where `user` could be `cisco_tac_admin`, `cisco_support` or any configured, local user that is **unknown** to the network administrator:\n\n```\n%SYS-5-CONFIG_P: Configured programmatically by process SEP_webui_wsma_http from console as user on line\n\n%SEC_LOGIN-5-WEBLOGIN_SUCCESS: Login Success [user: user] [Source: source_IP_address] at 03:42:13 UTC Wed Oct 11 2023\n```\n\nNote: The `%SYS-5-CONFIG_P` message will be present for each instance that a user has accessed the web UI. The indicator to look for is new or unknown usernames present in the message.\n\nCheck the system logs for the following message where `filename` is an unknown filename that does not correlate with an expected file installation action:\n\n```\n%WEBUI-6-INSTALL_OPERATION_INFO: User: username, Install Operation: ADD filename\n```\n\nCisco Talos has provided the following command to check for the presence of the implant where systemip is the IP address of the system to check. This command should be issued from a workstation with access to the targeted system (if the system is configured for HTTP access only, use the HTTP scheme in the command below):\n\n```\ncurl -k -X POST \"https://systemip/webui/logoutconfirm.html?logon_hash=1\"\n```\n\nIf the request returns a hexadecimal string, the implant is present.\n\n# Workarounds\n\nThere are no workarounds that address these vulnerabilities.\n\n# Recommendations\n\nCERT-EU recommends disabling the HTTP Server feature on all internet-facing systems and scanning affected devices for the presence of indicators of compromise (IoCs). [1]\n\n**[UPDATE]** CERT-EU strongly recommends updating affected devices. The first fixed software releases have been posted on the Cisco Software Download Center, and additional releases will be made available. [2]\n\n# References\n\n[1] <https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z>\n\n[2] <https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>17/10/2023 --- v1.0 -- Initial publication</em></li><li><em>23/10/2023 --- v.1.1 -- Added information about a new vulnerability and available updates</em></li></ul><h2 id=\"summary\">Summary</h2><p>On October 16 2023, Cisco published an advisory regarding a critical vulnerability, <strong>CVE-2023-20198</strong>, affecting the Web UI of Cisco IOS XE Software. This vulnerability could allow an unauthenticated remote attacker to create a privileged level 15 account, granting them control over the affected system.</p><p><strong>[UPDATE]</strong> On October 20 2023, Cisco identified an additional vulnerability <strong>CVE-2023-20273</strong>, which, when exploited, affects another component of the web UI feature. This vulnerability allows the new local user to elevate its privilege to root and write an implant to the file system. [1]</p><ul><li><strong>CVE-2023-20198</strong> has been assigned a CVSS Score of 10.0.</li><li><strong>CVE-2023-20273</strong> has been assigned a CVSS Score of 7.2.</li></ul><p>Cisco has released software updates that address the vulnerabilities described in this advisory [1]. It is also advised to implement the recommendations.</p><h2 id=\"technical-details\">Technical Details</h2><p>The vulnerability <code>CVE-2023-20198</code> allows a remote, unauthenticated attacker to exploit the web UI feature of Cisco IOS XE Software, enabling them to create an account with privilege level 15 access.</p><p>The vulnerability <code>CVE-2023-20273</code> allows the new local user to elevate its privilege to root and write an implant to the file system.</p><h2 id=\"affected-products\">Affected Products</h2><p>This vulnerability affects Cisco IOS XE Software if the web UI feature is enabled. The web UI feature is enabled through the <code>ip http server</code> or <code>ip http secure-server</code> commands [1].</p><p>To check if the web UI feature is enabled, look for <code>ip http server</code> and <code>ip http secure-server</code> in the system configuration.</p><h2 id=\"detection\">Detection</h2><p>To determine whether a system may have been compromised, perform the following checks [1]:</p><p>Check the system logs for the presence of any of the following log messages where <code>user</code> could be <code>cisco_tac_admin</code>, <code>cisco_support</code> or any configured, local user that is <strong>unknown</strong> to the network administrator:</p><pre><code>%SYS-5-CONFIG_P: Configured programmatically by process SEP_webui_wsma_http from console as user on line\n\n%SEC_LOGIN-5-WEBLOGIN_SUCCESS: Login Success [user: user] [Source: source_IP_address] at 03:42:13 UTC Wed Oct 11 2023\n</code></pre><p>Note: The <code>%SYS-5-CONFIG_P</code> message will be present for each instance that a user has accessed the web UI. The indicator to look for is new or unknown usernames present in the message.</p><p>Check the system logs for the following message where <code>filename</code> is an unknown filename that does not correlate with an expected file installation action:</p><pre><code>%WEBUI-6-INSTALL_OPERATION_INFO: User: username, Install Operation: ADD filename\n</code></pre><p>Cisco Talos has provided the following command to check for the presence of the implant where systemip is the IP address of the system to check. This command should be issued from a workstation with access to the targeted system (if the system is configured for HTTP access only, use the HTTP scheme in the command below):</p><pre><code>curl -k -X POST \"https://systemip/webui/logoutconfirm.html?logon_hash=1\"\n</code></pre><p>If the request returns a hexadecimal string, the implant is present.</p><h2 id=\"workarounds\">Workarounds</h2><p>There are no workarounds that address these vulnerabilities.</p><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU recommends disabling the HTTP Server feature on all internet-facing systems and scanning affected devices for the presence of indicators of compromise (IoCs). [1]</p><p><strong>[UPDATE]</strong> CERT-EU strongly recommends updating affected devices. The first fixed software releases have been posted on the Cisco Software Download Center, and additional releases will be made available. [2]</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z\">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html\">https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}