Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability

cisco-sa-webui-csrf-ycUYxkKO · High · Published · Updated

A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a cross-site request forgery (CSRF) attack and execute commands on the CLI of an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-csrf-ycUYxkKO This advisory is part of the September 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability.

However, administrators can disable service internal by issuing the no service internal command in global configuration mode. If this mitigation is chosen, there is no need to disable the HTTP Server as outlined in the following paragraph.

Disabling the HTTP Server feature eliminates the attack vector for this vulnerability and may be a suitable mitigation until affected devices can be upgraded. To disable the HTTP Server feature, use the no ip http server or no ip http secure-server command in global configuration mode. If both the HTTP server and HTTPS server are in use, both commands are required to disable the HTTP Server feature.

While these mitigations have been deployed and were proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2024-20437
Cisco Bug IDsCSCwh96411
CVSS ScoreBase 8.1
Base 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XE Software 17.3.2, Cisco IOS XE Software 17.3.3, Cisco IOS XE Software 17.3.2a, Cisco IOS XE Software 17.3.3a, Cisco IOS XE Software 17.3.4, Cisco IOS XE Software 17.3.5, Cisco IOS XE Software 17.3.4a, Cisco IOS XE Software 17.3.6, Cisco IOS XE Software 17.3.4b, Cisco IOS XE Software 17.3.4c, Cisco IOS XE Software 17.3.5a, Cisco IOS XE Software 17.3.5b, Cisco IOS XE Software 17.3.7, Cisco IOS XE Software 17.3.8, Cisco IOS XE Software 17.3.8a, Cisco IOS XE Software 17.4.1, Cisco IOS XE Software 17.4.2, Cisco IOS XE Software 17.4.1a, Cisco IOS XE Software 17.4.1b, Cisco IOS XE Software 17.4.1c, Cisco IOS XE Software 17.4.2a, Cisco IOS XE Software 17.5.1, Cisco IOS XE Software 17.5.1a, Cisco IOS XE Software 17.5.1b, Cisco IOS XE Software 17.5.1c, Cisco IOS XE Software 17.6.1, Cisco IOS XE Software 17.6.2, Cisco IOS XE Software 17.6.1w, Cisco IOS XE Software 17.6.1a, Cisco IOS XE Software 17.6.1x, Cisco IOS XE Software 17.6.3, Cisco IOS XE Software 17.6.1y, Cisco IOS XE Software 17.6.1z, Cisco IOS XE Software 17.6.3a, Cisco IOS XE Software 17.6.4, Cisco IOS XE Software 17.6.1z1, Cisco IOS XE Software 17.6.5, Cisco IOS XE Software 17.6.6, Cisco IOS XE Software 17.6.6a, Cisco IOS XE Software 17.6.5a, Cisco IOS XE Software 17.7.1, Cisco IOS XE Software 17.7.1a, Cisco IOS XE Software 17.7.1b, Cisco IOS XE Software 17.7.2, Cisco IOS XE Software 17.10.1, Cisco IOS XE Software 17.10.1a, Cisco IOS XE Software 17.10.1b, Cisco IOS XE Software 17.8.1, Cisco IOS XE Software 17.8.1a, Cisco IOS XE Software 17.9.1, Cisco IOS XE Software 17.9.1w, Cisco IOS XE Software 17.9.2, Cisco IOS XE Software 17.9.1a, Cisco IOS XE Software 17.9.1x, Cisco IOS XE Software 17.9.1y, Cisco IOS XE Software 17.9.3, Cisco IOS XE Software 17.9.2a, Cisco IOS XE Software 17.9.1x1, Cisco IOS XE Software 17.9.3a, Cisco IOS XE Software 17.9.4, Cisco IOS XE Software 17.9.1y1, Cisco IOS XE Software 17.9.4a, Cisco IOS XE Software 17.11.1, Cisco IOS XE Software 17.11.1a, Cisco IOS XE Software 17.12.1, Cisco IOS XE Software 17.12.1w, Cisco IOS XE Software 17.12.1a, Cisco IOS XE Software 17.12.1x, Cisco IOS XE Software 17.12.1y, Cisco IOS XE Software 17.11.99SW, Cisco IOS, Cisco IOS XE Software

Related Products

Product CVE Evidence
Cisco IOS CVE-2024-20437 Cisco OpenVuln
Cisco IOS XE Software CVE-2024-20437 Cisco OpenVuln
Cisco Catalyst 9600 Series Switches CVE-2024-20437 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2024-20437 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2024-20437 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2024-20437 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2024-20437 Cisco OpenVuln · software-dependent