一、 漏洞 CVE-2023-20198 基础信息
漏洞信息
                                        # N/A

## 漏洞概述
Cisco正在更新对Cisco IOS XE Software中Web UI功能被利用情况进行的持续调查。本次更新包括已修复版本列表,并添加了软件检测器。攻击者首先利用CVE-2023-20198获得了初始访问权限,并使用该权限创建了一个本地用户和密码组合,然后利用另一个Web UI功能组件提升权限至root,并将恶意代码写入文件系统。

## 影响版本
Cisco IOS XE Software(具体版本请参见修复列表)

## 细节
1. 攻击者首先利用CVE-2023-20198获取初始访问权限并创建一个本地用户和密码组合。
2. 使用创建的本地用户账号提升权限至root,并将恶意代码写入文件系统中。

## 影响
- **CVE-2023-20198**: CVSS评分10.0,可利用该漏洞获得系统控制权限。
- **CVE-2023-20273**: CVSS评分7.2,可利用该漏洞提升权限并持久化恶意代码。
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
未保护的候选通道
来源:美国国家漏洞数据库 NVD
漏洞标题
Cisco IOS XE Software 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Cisco IOS XE Software是美国思科(Cisco)公司的一个操作系统。用于企业有线和无线访问,汇聚,核心和WAN的单一操作系统,Cisco IOS XE降低了业务和网络的复杂性。 Cisco IOS XE Software 存在安全漏洞,该漏洞源于允许未经身份验证的远程攻击者在受影响的系统上创建具有特权的帐户。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-20198 的公开POC
# POC 描述 源链接 神龙链接
1 None https://github.com/raystr-atearedteam/CVE-2023-20198-checker POC详情
2 CVE-2023-20198 Checkscript https://github.com/Atea-Redteam/CVE-2023-20198 POC详情
3 cisco-CVE-2023-20198-tester https://github.com/securityphoenix/cisco-CVE-2023-20198-tester POC详情
4 None https://github.com/emomeni/Simple-Ansible-for-CVE-2023-20198 POC详情
5 CVE-2023-20198 & 0Day Implant Scanner https://github.com/ZephrFish/CVE-2023-20198-Checker POC详情
6 Checker for CVE-2023-20198 , Not a full POC Just checks the implementation and detects if hex is in response or not https://github.com/JoyGhoshs/CVE-2023-20198 POC详情
7 CVE-2023-20198 PoC (!) https://github.com/Tounsi007/CVE-2023-20198 POC详情
8 This script can identify if Cisco IOS XE devices are vulnerable to CVE-2023-20198 https://github.com/alekos3/CVE_2023_20198_Detector POC详情
9 Ansible Playbook for CVE-2023-20198 https://github.com/ditekshen/ansible-cve-2023-20198 POC详情
10 None https://github.com/reket99/Cisco_CVE-2023-20198 POC详情
11 1vere$k POC on the CVE-2023-20198 https://github.com/iveresk/cve-2023-20198 POC详情
12 CISCO CVE POC SCRIPT https://github.com/sohaibeb/CVE-2023-20198 POC详情
13 Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273) https://github.com/fox-it/cisco-ios-xe-implant-detection POC详情
14 A PoC for CVE 2023-20198 https://github.com/Pushkarup/CVE-2023-20198 POC详情
15 This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273 https://github.com/Shadow0ps/CVE-2023-20198-Scanner POC详情
16 Check a target IP for CVE-2023-20198 https://github.com/kacem-expereo/CVE-2023-20198 POC详情
17 None https://github.com/mr-r3b00t/CVE-2023-20198-IOS-XE-Scanner POC详情
18 None https://github.com/ohlawd/CVE-2023-20198 POC详情
19 None https://github.com/IceBreakerCode/CVE-2023-20198 POC详情
20 An Exploitation script developed to exploit the CVE-2023-20198 Cisco zero day vulnerability on their IOS routers https://github.com/sanjai-AK47/CVE-2023-20198 POC详情
21 CVE-2023-20198 Exploit PoC https://github.com/smokeintheshell/CVE-2023-20198 POC详情
22 Check for and remediate conditions that make an IOS-XE device vulnerable to CVE-2023-20198 https://github.com/netbell/CVE-2023-20198-Fix POC详情
23 Cisco CVE-2023-20198 https://github.com/Vulnmachines/Cisco_CVE-2023-20198 POC详情
24 An Exploitation script developed to exploit the CVE-2023-20198 Cisco zero day vulnerability on their IOS routers https://github.com/RevoltSecurities/CVE-2023-20198 POC详情
25 CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands. https://github.com/W01fh4cker/CVE-2023-20198-RCE POC详情
26 None https://github.com/sanan2004/CVE-2023-20198 POC详情
27 🚨 Just completed a detailed investigation for Event ID 193: "SOC231 - Cisco IOS XE Web UI ZeroDay (CVE-2023-20198)" via @LetsDefend.io. The attacker successfully bypassed authentication, gaining admin control over the device! Immediate containment was critical. Stay vigilant! 💻🔐 https://github.com/AhmedMansour93/Event-ID-193-Rule-Name-SOC231-Cisco-IOS-XE-Web-UI-ZeroDay-CVE-2023-20198- POC详情
28 CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞,允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户,从而完全控制设备。 https://github.com/XiaomingX/CVE-2023-20198-poc POC详情
29 CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞,允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户,从而完全控制设备。 https://github.com/XiaomingX/cve-2023-20198-poc POC详情
30 A go-exploit to scan for implanted Cisco IOS XE Systems cve-2023-20198, go-exploit https://github.com/unsightlyabol/cisco-ios-xe-implant-scanner POC详情
31 Exploit PoC for CVE-2023-20198 https://github.com/G4sul1n/Cisco-IOS-XE-CVE-2023-20198 POC详情
32 Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system. For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisory. Cisco will provide updates on the status of this investigation and when a software patch is available. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-20198.yaml POC详情
33 None https://github.com/Arshit01/CVE-2023-20198 POC详情
三、漏洞 CVE-2023-20198 的情报信息
四、漏洞 CVE-2023-20198 的评论

暂无评论


发表评论