QID 317368

Date Published: 2023-10-17

QID 317368: Cisco Internetwork Operating System (IOS) XE Software Web UI Command Injection Vulnerability (cisco-sa-webui-cmdij-FzZAeXAy)

A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device.

Affected Products:
Catalyst 9300 Series Switches
Catalyst 9400 Series Switches
Catalyst 9500 Series Switches
Catalyst 9800-CL Wireless Controllers for Cloud

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution

    Customers are advised to refer to cisco-sa-webui-cmdij-FzZAeXAy for more information.

    CVEs related to QID 317368

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-webui-cmdij-FzZAeXAy URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdij-FzZAeXAy