back to article Cisco zero-day bug allows router hijacking and is being actively exploited

Cisco users' weeks have started badly with a warning that a critical zero-day bug in the networking giant's IOS XE software that allows criminals to hijack devices has been exploited in the wild. The vulnerability, CVE-2023-20198, received a (im)perfect 10 CVSS severity rating from the networking giant, and Cisco is yet to …

  1. ecofeco Silver badge

    I'm losing track

    What number exploit bug for CISCO is this now?

    1. Yet Another Anonymous coward Silver badge

      Re: I'm losing track

      Well you know how you had to update a 64bit OS?

      1. Dimmer Silver badge

        Who uses that?

        no ip http server

        no ip http secure-server

        It and every other unnecessary service is disabled by default in our loads.

        Decrease the attack surface.

        Port Scan your routers, (all interfaces)and you might find other stuff on that you did not know about as well.

        1. teknopaul

          Re: Who uses that?

          "any switch, router or WLC running IOS XE and has the web UI exposed to the internet is vulnerable"

          Seems wierd that anyone would expose a routers admin UI to the Internet. Even if you did it by accident you would immediately get a lot of traffic flagged as bots target you.

  2. Mishak Silver badge

    (Public) Web management

    Just say "no"!

  3. Anonymous Coward
    Anonymous Coward

    The web server code compiles and links, quick ship it before anyone pen-tests it.

    1. KittenHuffer Silver badge

      I want a t-shirt that says "The pen(-tester) is mightier!"

  4. 42656e4d203239 Silver badge

    >>...unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks,

    So there isn't a vulnerability when exposed to trusted networks?

    The vulnerability doesn't go away just becasue you are connected to not("The Internet" or "untrusted network") - its still there and exploitable if the services are running.

    WTAF is a "trusted network" these days anyway? I thought the idea was to assume everything is a threat - you never know when a trojan might be present on your intranet and happily creating level 15 access to your routers becasue you truted the intranet.

  5. Duncan Macdonald

    This is what happens when you replace Huawei with Cisco

    See Title

  6. hittitezombie

    Sigh...

    What kind of idiot runs a Cisco with a public facing management web front-end?

    1. Richard 12 Silver badge

      Re: Sigh...

      A few, apparently.

      But more importantly, what about all those WiFi networks with BYOD connected?

  7. steamnut

    Redirect priorities

    Cisco should spend less time trying to stop business re-selling heir kit and focus on making their equipment more resilient. This is not the first, and wont be the last, CVE we will see.

    Like all of the big software vendors they don't stop to remove the bloat and just keep patching in knee-jerk mode. Microsoft, Adobe are you listening?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like