top of page

Cisco IOS XE Web Server Implant Check (CVE-2023-20198)



Application Details

Cisco IOS XE is a widely deployed Internetworking Operating System.


Vulnerability

Cisco IOS XE could allow a remote attacker to gain elevated privileges on the system, caused by active exploitation of a previously unknown vulnerability in the web UI feature.


Identification

An attacker could exploit this vulnerability to create an account on an affected system with privilege level 15 access and then use that account to gain control of the affected system.


Cisco’s Product Security Incident Response Team (PSIRT) has advised:

Organizations should look for unexplained or newly created users on  devices as evidence of potentially malicious activity relating to this  threat. One method to identify if the implant is present is to run the  following command against the device, where the "DEVICEIP” portion is a  placeholder for the IP address of the device to check:
POST /DEVICEIP/webui/logoutconfirm.html?logon_hash=1 

Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to create a priviledged account, on the affected system.


Coverage

Idappcom have created signature 8024315 along with a traffic file for this vulnerability.


References


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional

Комментарии


bottom of page