QID 316899

Date Published: 2021-03-30

QID 316899: Cisco IOS XE Software Web UI Cross-Site WebSocket Hijacking Vulnerability(cisco-sa-iosxe-cswsh-FKk9AzT5)

A vulnerability in the web UI feature of Cisco IOS XE Software could allow an unauthenticated,
remote attacker to conduct a cross-site WebSocket hijacking (CSWSH) attack
and cause a denial of service (DoS) condition on an affected device.

Affected Products Cisco devices if they are running a vulnerable release of Cisco IOS XE Software
and have the HTTP Server feature enabled.
The default state of the HTTP Server feature in
Cisco IOS XE Software is version and platform dependent.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to corrupt memory on the affected device, forcing it to reload and causing a DoS condition.

  • CVSS V3 rated as High - 7.4 severity.
  • CVSS V2 rated as High - 7.1 severity.
  • Solution

    Customers are advised to refer to cisco-sa-iosxe-cswsh-FKk9AzT5 for more information.

    CVEs related to QID 316899

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-iosxe-cswsh-FKk9AzT5 URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cswsh-FKk9AzT5