top of page

Cisco IOS XE Web Server Implant Check (CVE-2023-20198)

Application Details

Cisco IOS XE is a widely deployed Internetworking Operating System.


Cisco IOS XE could allow a remote attacker to gain elevated privileges on the system, caused by active exploitation of a previously unknown vulnerability in the web UI feature.


An attacker could exploit this vulnerability to create an account on an affected system with privilege level 15 access and then use that account to gain control of the affected system.

Cisco’s Product Security Incident Response Team (PSIRT) has advised:

Organizations should look for unexplained or newly created users on  devices as evidence of potentially malicious activity relating to this  threat. One method to identify if the implant is present is to run the  following command against the device, where the "DEVICEIP” portion is a  placeholder for the IP address of the device to check:
POST /DEVICEIP/webui/logoutconfirm.html?logon_hash=1 


By turning this into a traffic file and matching rule, we are able to detect attempts to create a priviledged account, on the affected system.


Idappcom have created signature 8024315 along with a traffic file for this vulnerability.


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here:


bottom of page