<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4945858#M262011</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Ref :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Courtesy and &lt;EM&gt;tx&lt;/EM&gt; to Nicolas Darchis on&lt;STRONG&gt; X&lt;/STRONG&gt; mentioning that the mentioned fixes will be posted throughout this week ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Oct 2023 08:31:49 GMT</pubDate>
    <dc:creator>Mark Elsen</dc:creator>
    <dc:date>2023-10-23T08:31:49Z</dc:date>
    <item>
      <title>CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942338#M261792</link>
      <description>&lt;P&gt;This seems bad. - "&lt;SPAN&gt;I'm fuzzy on the whole good/bad thing. What do you mean, "bad"? "........&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;LWA, and basically also CWA, uses the webservice of the 9800.&lt;/P&gt;
&lt;P&gt;Should we all just shut down our guest networks until a workaround / patch can be found ?&lt;/P&gt;
&lt;P&gt;Currently that is what Im thinking.&lt;/P&gt;
&lt;P&gt;Can anyone shed some light on my concern ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 14:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942338#M261792</guid>
      <dc:creator>Thomas Obbekaer Thomsen</dc:creator>
      <dc:date>2023-10-17T14:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942339#M261793</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;U&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;gt;...&lt;/EM&gt;&lt;/U&gt;&lt;SPAN&gt;&lt;U&gt;&lt;EM&gt;Can anyone shed some light on my concern ?&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&amp;nbsp; - The advised&amp;nbsp;strategy&amp;nbsp; for security issues with Cisco products , is : use the recommended software version first , for the 9800 platforms that would be &lt;STRONG&gt;&lt;FONT color="#008000"&gt;&lt;EM&gt;17.9.4&lt;/EM&gt;&lt;/FONT&gt; &lt;/STRONG&gt;, if the particular security problem is detected again and depending on business need -&amp;gt; contact &lt;STRONG&gt;TAC ,&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 14:58:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942339#M261793</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-10-17T14:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942344#M261795</link>
      <description>&lt;P&gt;So what you are saying is "this is fine" ? (insert "this is fine meme" here).&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 15:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942344#M261795</guid>
      <dc:creator>Thomas Obbekaer Thomsen</dc:creator>
      <dc:date>2023-10-17T15:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942361#M261797</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - As far as can recall my mind I am 'just saying' :&lt;EM&gt; the opposite ,&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 15:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942361#M261797</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-10-17T15:26:07Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942387#M261799</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&amp;nbsp;- FYI :&lt;/FONT&gt;&amp;nbsp;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh87343" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh87343&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 15:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942387#M261799</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-10-17T15:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942666#M261801</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Looking at BugsearchTool, known affected releases include 17.6.5 and 17.3.3, but does it also affect 17.12.1? &lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;I don't know how to try this vulnerability CVE-2023-20198.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 04:37:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942666#M261801</guid>
      <dc:creator>Yasuhiro Ikuta</dc:creator>
      <dc:date>2023-10-18T04:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942684#M261803</link>
      <description>&lt;P&gt;Would be nice to know if the recommended releases are fixed from this CVE &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Lets us know Thomas if you hear something.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 05:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942684#M261803</guid>
      <dc:creator>RoadRunner4k</dc:creator>
      <dc:date>2023-10-18T05:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942729#M261805</link>
      <description>&lt;P&gt;&lt;SPAN class="HwtZe"&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Not a particularly concrete answer to Thomas.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;BR /&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;It would be nice to know if enabled central web auth on the WLC contributes to security vulnerabilities or not.&lt;BR /&gt;&lt;BR /&gt;/Finn&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 07:15:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942729#M261805</guid>
      <dc:creator>Finn Rud Laursen</dc:creator>
      <dc:date>2023-10-18T07:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942778#M261808</link>
      <description>&lt;P&gt;&lt;SPAN class="HwtZe"&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;And of course also local web auth &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 08:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4942778#M261808</guid>
      <dc:creator>Finn Rud Laursen</dc:creator>
      <dc:date>2023-10-18T08:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943000#M261817</link>
      <description>&lt;P&gt;Havent heard anything additional yet.&lt;/P&gt;
&lt;P&gt;But this being a 10.0 ... I mean .. thats&amp;nbsp; bad ...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And the silence from Cisco worries me.&lt;/P&gt;
&lt;P&gt;So Im right now recommending my customers to not use LWA or CWA as a precaution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 12:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943000#M261817</guid>
      <dc:creator>Thomas Obbekaer Thomsen</dc:creator>
      <dc:date>2023-10-18T12:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943003#M261818</link>
      <description>&lt;P&gt;Yep that would be really nice to know.&lt;/P&gt;
&lt;P&gt;CWA uses some part of the webservice I know (because it does not work if you disable http / https on the 9800), but is this short usage of the webservice for CWA an attack vector ? We just dont know, and Cisco seems awfully quiet &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;For now, Im recommending customers to not use CWA or LWA, just in case, since this vulnerability has been proven "in the wild".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 12:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943003#M261818</guid>
      <dc:creator>Thomas Obbekaer Thomsen</dc:creator>
      <dc:date>2023-10-18T12:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943006#M261819</link>
      <description>&lt;P&gt;the CVE basically says all IOS-XE products with the webservice enabled.&lt;/P&gt;
&lt;P&gt;And there are no "fixes", so there is a very big possibility that all IOS-XE softwares are affected.&lt;/P&gt;
&lt;P&gt;The only recommendation is also just to turn of http and https until a patch can be made available.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 12:47:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943006#M261819</guid>
      <dc:creator>Thomas Obbekaer Thomsen</dc:creator>
      <dc:date>2023-10-18T12:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943015#M261820</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Ref :&amp;nbsp; &amp;nbsp;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z&lt;/A&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; &amp;gt;...If the&amp;nbsp;&lt;STRONG&gt;ip http server&amp;nbsp;&lt;/STRONG&gt;command is present and the configuration also contains&amp;nbsp;&lt;STRONG&gt;ip http active-session-modules none&lt;/STRONG&gt;, the &lt;FONT color="#008000"&gt;vulnerability is &lt;STRONG&gt;not&lt;/STRONG&gt; exploitable over HTTP.&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;If the&amp;nbsp;&lt;STRONG&gt;ip http secure-server&amp;nbsp;&lt;/STRONG&gt;command is present and the configuration also contains&amp;nbsp;&lt;STRONG&gt;ip http secure-active-session-modules none&lt;/STRONG&gt;, &lt;FONT color="#008000"&gt;the vulnerability is &lt;STRONG&gt;not&lt;/STRONG&gt; exploitable over HTTPS.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 13:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943015#M261820</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-10-18T13:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943037#M261826</link>
      <description>&lt;P&gt;Yes that makes perfect sense, that telling the config that you cannot have any sessions to the webservice makes the exploit not work.&lt;/P&gt;
&lt;P&gt;I dont know what scenario you would configure this in. Enable the webservice, but not have it accept any sessions ?&lt;/P&gt;
&lt;P&gt;But Im pretty certain (and I have not tested this) that this will also make CWA and LWA not work.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 13:39:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943037#M261826</guid>
      <dc:creator>Thomas Obbekaer Thomsen</dc:creator>
      <dc:date>2023-10-18T13:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943060#M261828</link>
      <description>&lt;P&gt;the (obvious) solution is&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;"no ip http server"&lt;/LI&gt;
&lt;LI&gt;"no ip http secure-server"&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;i would expect that anyone who doesn't need the HTTP/HTTPS services on a device has long since turned them off.&lt;BR /&gt;=&amp;gt; if not, the time has come to do so.&lt;/P&gt;
&lt;P&gt;For those who do need the HTTP/HTTPS service, the suggested approach is not possible.&lt;/P&gt;
&lt;P&gt;Who could this be?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;e.g. operator of an IOS-based CA (Certificate Authority).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For these it would be nice to be able to "harden" HTTP accesses.&lt;BR /&gt;=&amp;gt; Allow only specific (e.g. loopback IPs of other routers which are allowed to access the CA) sources to exactly one loopback IP of the CA router.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;"ip http access-class" - no "extended ACLs" are possible,&lt;/LI&gt;
&lt;LI&gt;CoPP (Control-Plane Policing)&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;CoPP uses (extended) ACLs to Classify Traffic.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Approach:&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;*** this doesn't solve any Authentication-Issue, but limits the exposure ***&lt;/FONT&gt;&lt;BR /&gt;3 Classes (for this purpose, others possible)&lt;BR /&gt;Class (A) - HTTP/HTTPs traffic which is allowed (correct source-IPs, correct destination-IPs - and ports)&lt;BR /&gt;Class (B) - all other HTTP/HTTPs traffic&lt;BR /&gt;Class (C) - the remaining (class-default) traffic.&lt;/P&gt;
&lt;P&gt;Works fine here.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ip access-list extended ACL_HTTP_LOOP
 permit tcp any host &amp;lt;LOOPBACK-IP for CA&amp;gt; eq www
 permit tcp any host &amp;lt;LOOPBACK-IP for CA&amp;gt; eq 443
class-map match-all CM_HTTP_LOOP
 match access-group name ACL_HTTP_LOOP

ip access-list extended ACL_HTTP
 permit tcp any any eq www
 permit tcp any any eq 443
class-map match-all CM_HTTP
 match access-group name ACL_HTTP

policy-map PM_COPP
 !
 ! "transmit any datarate" = permit
 !
 class CM_HTTP_LOOP
  police cir 8000 conform-action transmit exceed-action transmit violate-action transmit
 !
 ! "drop any datarate" = deny
 !
 class CM_HTTP
  police cir 8000 conform-action drop exceed-action drop violate-action drop
 !
 ! add "normal" CoPP-Policies here
 !
 class class-default
  police cir 8000 conform-action transmit exceed-action transmit violate-action transmit

control-plane
 service-policy input PM_COPP
!

&lt;/LI-CODE&gt;
&lt;P&gt;CoPP Statistics after "an Attack" - wrong Source-IP or wrong Destination-IP for HTTP:&lt;/P&gt;
&lt;P&gt;* get's dropped in Class CM_HTTP&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Router# show policy-map control-plane input
 Control Plane

  Service-policy input: PM_COPP

    Class-map: CM_HTTP_LOOP (match-all)
      0 packets, 0 bytes
      5 minute offered rate 0000 bps, drop rate 0000 bps
      Match: access-group name ACL_HTTP_LOOP
      police:
          cir 8000 bps, bc 1500 bytes, be 1500 bytes
        conformed 0 packets, 0 bytes; actions:
          transmit
        exceeded 0 packets, 0 bytes; actions:
          transmit
        violated 0 packets, 0 bytes; actions:
          transmit
        conformed 0000 bps, exceeded 0000 bps, violated 0000 bps

    Class-map: CM_HTTP (match-all)
      34 packets, 2127 bytes
      5 minute offered rate 0000 bps, drop rate 0000 bps
      Match: access-group name ACL_HTTP
      police:
          cir 8000 bps, bc 1500 bytes, be 1500 bytes
        conformed 34 packets, 2127 bytes; actions:
          drop
        exceeded 0 packets, 0 bytes; actions:
          drop
        violated 0 packets, 0 bytes; actions:
          drop
        conformed 0000 bps, exceeded 0000 bps, violated 0000 bps

    Class-map: class-default (match-any)
      1329 packets, 77200 bytes
      5 minute offered rate 2000 bps, drop rate 0000 bps
      Match: any
      police:
          cir 8000 bps, bc 1500 bytes, be 1500 bytes
        conformed 1329 packets, 77200 bytes; actions:
          transmit
        exceeded 0 packets, 0 bytes; actions:
          transmit
        violated 0 packets, 0 bytes; actions:
          transmit
        conformed 2000 bps, exceeded 0000 bps, violated 0000 bps
&lt;/LI-CODE&gt;
&lt;P&gt;CoPP Statistics after "allowed HTTP":&lt;/P&gt;
&lt;P&gt;* get's permitted in Class "HTTP_LOOP"&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;!
! Zugriff auf die (erlaubte) Loopback-IP
!
Router# show policy-map control-plane input
 Control Plane

  Service-policy input: PM_COPP

    Class-map: CM_HTTP_LOOP (match-all)
      467 packets, 44940 bytes
      5 minute offered rate 3000 bps, drop rate 0000 bps
      Match: access-group name ACL_HTTP_LOOP
      police:
          cir 8000 bps, bc 1500 bytes, be 1500 bytes
        conformed 188 packets, 14000 bytes; actions:
          transmit
        exceeded 35 packets, 4309 bytes; actions:
          transmit
        violated 244 packets, 26631 bytes; actions:
          transmit
        conformed 2000 bps, exceeded 1000 bps, violated 2000 bps

    Class-map: CM_HTTP (match-all)
      147 packets, 9477 bytes
      5 minute offered rate 0000 bps, drop rate 0000 bps
      Match: access-group name ACL_HTTP
      police:
          cir 8000 bps, bc 1500 bytes, be 1500 bytes
        conformed 157 packets, 10125 bytes; actions:
          drop
        exceeded 0 packets, 0 bytes; actions:
          drop
        violated 0 packets, 0 bytes; actions:
          drop
        conformed 0000 bps, exceeded 0000 bps, violated 0000 bps

    Class-map: class-default (match-any)
      2744 packets, 159642 bytes
      5 minute offered rate 1000 bps, drop rate 0000 bps
      Match: any
      police:
          cir 8000 bps, bc 1500 bytes, be 1500 bytes
        conformed 2811 packets, 163540 bytes; actions:
          transmit
        exceeded 0 packets, 0 bytes; actions:
          transmit
        violated 0 packets, 0 bytes; actions:
          transmit
        conformed 1000 bps, exceeded 0000 bps, violated 0000 bps&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 14:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943060#M261828</guid>
      <dc:creator>r.heitmann</dc:creator>
      <dc:date>2023-10-18T14:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943069#M261829</link>
      <description>&lt;P&gt;Refer to the URLs Marce shared - the bug has recommended mitigations (which should already be standard practice anyway)&lt;BR /&gt;Also see&amp;nbsp;&lt;A href="https://vulncheck.com/blog/cisco-implants" target="_blank" rel="noopener"&gt;https://vulncheck.com/blog/cisco-implants&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-20198" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2023-20198&lt;/A&gt;&amp;nbsp;which has some additional links.&lt;BR /&gt;As far as I can tell this affects all current versions of released code, nothing fixed available yet but I think they're still checking.&amp;nbsp; You should assume they are all vulnerable.&lt;/P&gt;
&lt;P&gt;I think this only affects the admin web interface, but web auth interface should never be accessible to internet anyway if you have configured the WLC correctly.&amp;nbsp; And if you follow standard security guidelines your web admin interface should not be accessible to wireless users and access should be restricted to known authorised IP addresses.&lt;/P&gt;
&lt;P&gt;The primary risk is if you have exposed the admin web interface to the internet with unrestricted access - then it's only a matter of time before you're compromised (if not already) unless you take action right away.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 14:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943069#M261829</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2023-10-18T14:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943073#M261830</link>
      <description>&lt;P&gt;I completely concur that disabling http / https is the solution if you have (for some reason) the webservice of your IOS-XE device exposed to an , lets call it, "open" network.&lt;/P&gt;
&lt;P&gt;I just really want to know, for sure,&amp;nbsp; if this "exposure" also includes 9800 when running CWA. I mean the 9800 does not have an IP interface in the guest network. Buuut, it kinda intercepts the clients request via the webservice anyway (thats why you need it enabled when configuring and using CWA). I just want to knoooowwww !!! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Im pretty sure LWA is vulnerable because the client gets redirected to a , lets call "loopback", interface in the 9800 for the LWA login page.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 14:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943073#M261830</guid>
      <dc:creator>Thomas Obbekaer Thomsen</dc:creator>
      <dc:date>2023-10-18T14:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943079#M261832</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;- The workaround does not relate to&amp;nbsp; sessions&amp;nbsp; , it prevents the web server from loading additional modules ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 14:20:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943079#M261832</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-10-18T14:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943080#M261833</link>
      <description>&lt;P&gt;But this is what I really want to know .. if its the webservice (no matter if it runs the admin page or a web auth page) that is vulnerabel, then having it "exposed" to an open network (the guest network) is also pretty bad.&lt;/P&gt;
&lt;P&gt;Sure, of course we have all protected the admin interface of the device , and surely no-one has anything exposed towards the internet directly. But that open guest network, in a large organization, can be "available" in many places.&lt;/P&gt;
&lt;P&gt;And if the webservice can be accessed (not admin, but LWA or CWA) from the guest network for login purposes, and is vulnerabel because of this CVE, it would be disastrous .&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 14:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943080#M261833</guid>
      <dc:creator>Thomas Obbekaer Thomsen</dc:creator>
      <dc:date>2023-10-18T14:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-20198 Software Web UI Privilege Escalation Vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943108#M261836</link>
      <description>&lt;P&gt;you're right - but it's somehow weird, that a simple&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ip http active-session-modules none
ip http secure-active-session-modules none&lt;/LI-CODE&gt;
&lt;P&gt;didn't make it to "recommendations" in the Cisco document - Cisco states "workarounds available: no"&lt;/P&gt;
&lt;P&gt;... so "disable http" or "restrict access" is all Cisco recommends, if I'm not wrong.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rheitmann_1-1697640624586.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/199976i794F230642FCA9B2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rheitmann_1-1697640624586.png" alt="rheitmann_1-1697640624586.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 14:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cve-2023-20198-software-web-ui-privilege-escalation/m-p/4943108#M261836</guid>
      <dc:creator>r.heitmann</dc:creator>
      <dc:date>2023-10-18T14:51:57Z</dc:date>
    </item>
  </channel>
</rss>

