Cisco.IOS.XE.Web.UI.REST.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Cisco IOS XE Software.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Outbreak Alert
Active exploitation of a previously unknown vulnerabilities in the Web User Interface (Web UI) of Cisco IOS XE software when exposed to the internet or untrusted networks. According to open source articles, thousands of vulnerable devices have been compromised.
Affected Products
Cisco IOS XE Software 17.9.x prior to 17.9.4a
Cisco IOS XE Software 17.6.x prior to 17.6.6a
Cisco IOS XE Software 17.3.x prior to 17.3.8a
Cisco IOS XE Software 16.12.x prior to 16.12.10a
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |