Critical Vulnerability: Cisco IOS Now Patch Available (CVE-2023-20198)

Vulnerabilities

Critical Vulnerability: Cisco IOS Now Patch Available (CVE-2023-20198)


by Chris Gerritz

3 min read


Published: 24 October 2023

Last Updated: 24 October 2023

DEFCON-level vulnerabilities in Cisco IOS’s Web UI, which has resulted in tens of thousands of Cisco switches and routers hacked in the last month, has finally been patched (as of 23 Aug 2023).

Cisco IOS is the operating system of Cisco devices and its’ web User Interface (UI), if enabled, is being actively attacked with two major remote code execution (RCE) vulnerabilities (CVE-2023-20198 & CVE-2023-20273) that were first reported early last week. Over 140,000 Cisco devices are exposed to the internet and at least 30,487 devices and growing have been confirmed compromised so far.


Vulnerability Information

Description: This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system at the highest privilege levels.

Note: Cisco IOS has multiple supported release trains depending on device type and your update schedule. 17.9 is the latest. If you run IOS versions 17.6, 17.3, or 16.12 (Catalyst 3650 and 3850 only), be on the lookout for updates soon.


Recommended Actions

Determine if the Web UI is Enabled (From the IOS Command Line)

The feature being exploited is called the HTTP Server (http server or http secure-server). You can determine if this is enabled by running the following commands from your Cisco device’s commandline interface (CLI):

> show running-config | include ip http server|secure|active

Note: If the name of either feature is returned from the system configuration, than the web UI feature is enabled.

Update IOS Versions

Block or Limit Remote Access to Cisco Devices

If enabled, ensure the device is not accessible from the internet or an untrusted subnet on TCP ports 80 and 443. Either disable the web UI feature completely or heavily restrict routing to this device on those ports.

Cisco provided guidance on how to limit access using an access control list inside IOS like so:

Audit IOS User Accounts on Suspect Devices

If you find an IOS device that was exposed to the internet or an untrusted network, look for any unfamiliar or new user accounts created in the last 60 days.

Chris Gerritz

Director, Information Security

Chris joined Datto through the 2022 acquisition of Infocyte, Inc., a detection and response technology company. As co-founder of Infocyte, he led the company from its inception as chief executive and head of product.

From a decade of military service, Chris draws on both leadership and deep technical experience serving as a cryptographic systems maintainer, cyber warfare officer and pilot. In his final assignment, Chris established the U.S. Air Force’s elite Defensive Counter-Cyber (DCC) practice. In this role, he led a team of 28 operators tasked with finding, tracking, and neutralizing state-sponsored threats on the Air Force’s $2B, 800k node enterprise network.

Chris holds a B.S. in Electrical & Computer Engineering from Oregon State University.