QID 316899
Date Published: 2021-03-30
QID 316899: Cisco IOS XE Software Web UI Cross-Site WebSocket Hijacking Vulnerability(cisco-sa-iosxe-cswsh-FKk9AzT5)
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an unauthenticated,
remote attacker to conduct a cross-site WebSocket hijacking (CSWSH) attack
and cause a denial of service (DoS) condition on an affected device.
Affected Products
Cisco devices if they are running a vulnerable release of Cisco IOS XE Software
and have the HTTP Server feature enabled.
The default state of the HTTP Server feature in
Cisco IOS XE Software is version and platform dependent.
QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
A successful exploit could allow the attacker to corrupt memory on the affected device, forcing it to reload and causing a DoS condition.
Customers are advised to refer to cisco-sa-iosxe-cswsh-FKk9AzT5 for more information.
- cisco-sa-iosxe-cswsh-FKk9AzT5 -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cswsh-FKk9AzT5
CVEs related to QID 316899
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-iosxe-cswsh-FKk9AzT5 |
|