Loading HuntDB...

CVE-2023-20273

HIGH
Published 2023-10-24T14:13:36.311Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2023-20273. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.2
/10
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.927
probability
of exploitation in the wild

There is a 92.7% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.997
Higher than 99.7% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.

Available Exploits

No exploits available for this CVE.

Related News

CVE-2023-20198 & CVE-2023-20273: RedMike Attacks 1,000+ Cisco Devices in Global Espionage Campaign

Cybersecurity researchers at Insikt Group have identified an ongoing cyber espionage campaign by RedMike (also tracked as Salt The post CVE-2023-20198 & CVE-2023-20273: RedMike Attacks 1,000+ Cisco Devices in Global Espionage Campaign appeared first on Cybersecurity News.

SecurityOnline.info 2025-02-18 02:06

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

October 27, 2023

Added to KEV

October 23, 2023

Required Action

Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.

Affected Product

Vendor/Project: Cisco
Product: Cisco IOS XE Web UI

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-xm3x-5hpf-5369

Advisory Details

A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: October 25, 2023, Modified: November 7, 2023

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

4 posts
Reddit 2 weeks, 1 day ago
fruderduck
Exploit

Salt Typhoon Security Hack https://www.forbes.com/sites/emilsayegh/2025/08/30/us-and-allies-declare-salt-typhoon-hack-a-national-defense-crisis/ The FBI and allied international intelligence agencies have declared the Salt Typhoon cyber campaign a national defense crisis after uncovering widespread infiltration of global telecommunications networks by Chinese state-backed hackers. In one of the most sweeping espionage operations ever exposed, Salt Typhoon actors compromised the …

488
55
598.0
View Original High Risk
Reddit 2 weeks, 4 days ago
technadu
Exploit

CISA Issues Global Warning on Chinese State-Sponsored Espionage Campaign A coalition of cybersecurity agencies (U.S., U.K., AU, CA, NZ) has released **Advisory AA25-239A**, detailing a **major cyber espionage operation** attributed to **Chinese state-sponsored actors**. 📌 Key details: * Target sectors: **Telecom, government, transportation**. * Countries affected: U.S., U.K., Australia, Canada, …

2
3
8.0
View Original High Risk
Reddit 2 months, 2 weeks ago
crstux
Exploit

🔥 Top 10 Trending CVEs (26/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-6543](https://nvd.nist.gov/vuln/detail/CVE-2025-6543)** - 📝 Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway whenconfigured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP …

0.0
View Original High Risk
Reddit 2 months, 3 weeks ago
crstux
Exploit

🔥 Top 10 Trending CVEs (25/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-50054](https://nvd.nist.gov/vuln/detail/CVE-2025-50054)** - 📝 Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2.5.8 and earlier allows a local user process to send a too large control message buffer to …

1
1.0
View Original High Risk

References

HackerOne Reports

offensiveops
MTN Group
Command Injection - Generic
Published: 2023-10-24T14:13:36.311Z
Last Modified: 2025-07-28T19:43:50.048Z
Copied to clipboard!