Cisco Releases Security Advisory for Actively Exploited Vulnerability CVE-2023-20198
The security advisory addresses a critical privilege escalation vulnerability found in Cisco IOS XE Software Web UI
Summary
The security advisory addresses a critical privilege escalation vulnerability found in Cisco IOS XE Software Web UI
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Cisco has released a security advisory for an exploited zero-day vulnerability tracked as CVE-2023-20198. The critical vulnerability, with a CVSSv3 score of 10, is a privilege escalation vulnerability.
An unauthenticated, remote attacker could exploit this vulnerability to create an account on an affected system with privilege level 15 access. This account could then be used to gain control of the targeted system.
Exploitation of CVE-2023-20198
Cisco are aware of active exploitation of this vulnerability. The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-20198 to their Known Exploited Vulnerability Catalog based on evidence of active exploitation in the wild.
Remediation advice
Affected organisations are required to review the Cisco Security Advisory cisco-sa-iosxe-webui-privesc-j22SaA4z and apply the relevant recommendations.
Remediation steps
Definitive source of threat updates
Last edited: 17 October 2023 4:50 pm