The web UI component of Cisco IOS XE Software has a previously undiscovered vulnerability that, when exposed to the internet or untrusted networks, is already being actively exploited, according to Cisco. Due to this vulnerability, a remote, unauthenticated attacker is able to set up an account with privilege level 15 access on a vulnerable system. Afterward, the attacker can take control of the compromised machine using that account.
CVE-2023-20198 is a privilege escalation vulnerability affecting Cisco IOS XE software, receiving the highest possible CVSS score of 10. Successful exploitation of this vulnerability would allow an attacker to create a user account with full administrative privileges.
This Proof of Concept (PoC) is presented solely for educational and informational purposes. The intent behind sharing this PoC is to demonstrate potential vulnerabilities in a controlled environment. The goal is to promote understanding of cybersecurity concepts and encourage responsible disclosure.
- Ethical Use: This PoC should only be used in environments and systems where you have explicit authorization. Unauthorized access to computer systems is illegal and unethical.
- Responsible Disclosure: If you discover vulnerabilities as a result of this PoC, it is strongly recommended to report them responsibly to the relevant parties, allowing them adequate time to address and mitigate the issues.
- No Endorsement: This PoC and related materials do not endorse or encourage any form of unauthorized access, hacking, or any other illegal activities.
By accessing and using this PoC, you acknowledge that you are solely responsible for your actions and agree to use this information in compliance with applicable laws and regulations. The author assumes no liability for any misuse or consequences arising from the use of this PoC for any purpose other than education and responsible disclosure.
- User Creation: Demonstrates the creation of a local user account on a target web application.
- Implant Installation: Installs an implant configuration on the target web application.
- Web Server Restart: Restarts the web server on the target to activate the implant.
- Implant Status Check: Checks the status of the implanted code on the target.
- Python 3.x
- Required Python packages:
requests
,colorama
-
Clone the repository:
git clone https://github.com/Pushkarup/CVE-2023-20198.git cd CVE-2023-20198
-
Install the required Python packages:
pip install colorama pip install requests
-
Create a text file containing the target sites (one per line) and save it with a
.txt
extension. •Collect site list for test using dorklabels='cisco-xe-webui'
-
Edit the Variable config_content in line 121 according to your need . Below is a sample config
config_content = """ #This is a sample configuration content param1: value1 param2: value2 nested_params: nested_param1: nested_value1 nested_param2: nested_value2 """
-
Run the script:
python main.py
-
Follow the prompts to process the target sites.
Contributions are welcome! If you find any issues or have improvements, feel free to open a pull request or create an issue.
This project is licensed under the MIT License.
- GitHub: Pushkar Upadhyay
- LinkedIn: Pushkar Upadhyay
- BTC: 3QqVBBzDBezA9U77PCTwMPQVGb1eecv2SP
- ETH: 0xB779767483831BD98327A449C78FfccE2cc6df0a
- USDT: 0xB779767483831BD98327A449C78FfccE2cc6df0a