INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h
Vulnerabilities

CVE-2023-20198

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Cisco IOS XE Web UI Privilege Escalation - Unauthenticated Remote Code Execution
Published: Oct 16, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Cisco IOS XE Web UI Privilege Escalation Vulnerability — Cisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device.

🤖 AI Executive Summary

CVE-2023-20198 is a critical privilege escalation vulnerability in Cisco IOS XE Web UI allowing unauthenticated remote attackers to create administrative accounts with privilege level 15 access. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses an immediate threat to network infrastructure across Saudi Arabia. Affected organizations must apply patches urgently as this enables complete device compromise and potential lateral movement within critical networks.

📄 Description (Arabic)

تحتوي واجهة ويب Cisco IOS XE على ثغرة تصعيد امتيازات تسمح لمهاجم بعيد غير مصرح بإنشاء حساب بمستوى امتياز 15 دون الحاجة للمصادقة. يمكن للمهاجم استخدام هذا الحساب للسيطرة الكاملة على الجهاز المتأثر. الثغرة موجودة في آلية التحقق من الهوية في واجهة الويب وتؤثر على إصدارات متعددة من Cisco IOS XE.

🤖 ملخص تنفيذي (AI)

CVE-2023-20198 عبارة عن ثغرة حرجة في واجهة الويب لنظام Cisco IOS XE تسمح للمهاجمين غير المصرحين بإنشاء حسابات إدارية بمستوى امتياز 15. مع درجة CVSS 9.0 والاستغلال المتاح علناً، تشكل هذه الثغرة تهديداً فورياً للبنية التحتية للشبكات في المملكة العربية السعودية. يجب على المنظمات المتأثرة تطبيق التصحيحات بشكل عاجل لأن هذا يمكّن من السيطرة الكاملة على الجهاز والحركة الجانبية المحتملة داخل الشبكات الحرجة.

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 04:48
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability critically impacts Saudi Arabia's telecommunications sector (STC, Mobily, Zain), banking infrastructure (SAMA-regulated institutions), government networks (NCA, NCSC oversight), and energy sector (ARAMCO, SEC). Cisco IOS XE devices are widely deployed as core network infrastructure in these sectors. Exploitation enables attackers to establish persistent administrative access, intercept communications, exfiltrate sensitive data, and disrupt critical services. The unauthenticated nature and public exploit availability make this an immediate threat requiring emergency response across all critical infrastructure operators.
🏢 Affected Saudi Sectors
Telecommunications (STC, Mobily, Zain) Banking and Financial Services (SAMA-regulated) Government and Defense (NCA, NCSC) Energy and Utilities (ARAMCO, SEC) Healthcare Critical Infrastructure Large Enterprise Networks
⚖️ Saudi Risk Score (AI)
9.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Cisco IOS XE devices in your network using asset management tools and SNMP scanning
2. Isolate or restrict web UI access to affected devices immediately using network segmentation and ACLs
3. Disable the web UI if not operationally required; use SSH/CLI management instead
4. Monitor for suspicious account creation attempts in device logs (check 'show users' and 'show aaa sessions')
5. Review authentication logs for unauthorized access attempts

PATCHING GUIDANCE:
1. Apply Cisco security patches immediately - versions 17.3.4.11, 17.6.3, 17.9.2 and later contain fixes
2. Prioritize patching for internet-facing or DMZ-located devices
3. Test patches in lab environment before production deployment
4. Schedule maintenance windows for critical devices with minimal business impact

COMPENSATING CONTROLS (if patching delayed):
1. Implement network-based access controls restricting web UI access to trusted management networks only
2. Deploy WAF rules blocking suspicious account creation requests
3. Enable MFA/2FA on all administrative accounts
4. Implement IP whitelisting for web UI access
5. Deploy IDS/IPS signatures detecting CVE-2023-20198 exploitation attempts

DETECTION RULES:
1. Monitor for HTTP POST requests to /webui/logoutconfirm.html or similar endpoints
2. Alert on creation of new local user accounts via web UI
3. Monitor for privilege level 15 account creation in device logs
4. Track failed authentication attempts followed by successful admin access
5. Monitor for changes to AAA configuration via web interface
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة Cisco IOS XE في شبكتك باستخدام أدوات إدارة الأصول وفحص SNMP
2. عزل أو تقييد الوصول إلى واجهة الويب للأجهزة المتأثرة فوراً باستخدام تقسيم الشبكة وقوائم التحكم في الوصول
3. تعطيل واجهة الويب إذا لم تكن مطلوبة تشغيلياً؛ استخدم إدارة SSH/CLI بدلاً من ذلك
4. مراقبة محاولات إنشاء حسابات مريبة في سجلات الجهاز (تحقق من 'show users' و 'show aaa sessions')
5. مراجعة سجلات المصادقة لمحاولات الوصول غير المصرح بها

إرشادات التصحيح:
1. تطبيق تصحيحات أمان Cisco فوراً - الإصدارات 17.3.4.11 و 17.6.3 و 17.9.2 والإصدارات الأحدث تحتوي على إصلاحات
2. أولويات التصحيح للأجهزة المواجهة للإنترنت أو الموجودة في DMZ
3. اختبار التصحيحات في بيئة المختبر قبل النشر الإنتاجي
4. جدولة نوافذ الصيانة للأجهزة الحرجة بأقل تأثير على الأعمال

الضوابط البديلة (إذا تأخر التصحيح):
1. تنفيذ ضوابط الوصول المستندة إلى الشبكة تقيد الوصول إلى واجهة الويب للشبكات الموثوقة فقط
2. نشر قواعد WAF تحجب طلبات إنشاء الحسابات المريبة
3. تفعيل MFA/2FA على جميع الحسابات الإدارية
4. تنفيذ القائمة البيضاء للعناوين IP لوصول واجهة الويب
5. نشر توقيعات IDS/IPS للكشف عن محاولات استغلال CVE-2023-20198

قواعد الكشف:
1. مراقبة طلبات HTTP POST إلى /webui/logoutconfirm.html أو نقاط نهاية مماثلة
2. تنبيه عند إنشاء حسابات مستخدم محلية جديدة عبر واجهة الويب
3. مراقبة إنشاء حسابات مستوى امتياز 15 في سجلات الجهاز
4. تتبع محاولات المصادقة الفاشلة متبوعة بالوصول الإداري الناجح
5. مراقبة التغييرات على تكوين AAA عبر واجهة الويب
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.8.1 - Asset Management and Inventory Control ECC 2024 A.8.2 - Vulnerability Management ECC 2024 A.9.1 - Access Control and Authentication ECC 2024 A.9.2 - User Access Management ECC 2024 A.12.6 - Logging and Monitoring ECC 2024 A.13.1 - Incident Management
🔵 SAMA CSF
SAMA CSF ID.AM-2 - Software Platforms and Applications SAMA CSF PR.AC-1 - Identities and Credentials SAMA CSF PR.AC-4 - Access Rights Management SAMA CSF DE.CM-1 - Network Monitoring SAMA CSF DE.CM-3 - Attack Detection SAMA CSF RS.MI-2 - Incident Response and Recovery
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 - Access Control ISO 27001:2022 A.5.16 - Authentication ISO 27001:2022 A.5.17 - Access Rights ISO 27001:2022 A.8.1 - Asset Management ISO 27001:2022 A.8.2 - Configuration Management ISO 27001:2022 A.8.6 - Vulnerability Management ISO 27001:2022 A.12.4 - Logging ISO 27001:2022 A.12.6 - Management of Technical Vulnerabilities
🟣 PCI DSS v4.0
PCI DSS 2.1 - Default Passwords and Security Parameters PCI DSS 6.2 - Security Patches and Updates PCI DSS 7.1 - Access Control Implementation PCI DSS 8.1 - User Identification and Authentication PCI DSS 10.2 - Logging and Monitoring
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Cisco:IOS XE Web UI
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.01%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-10-20
Published 2023-10-16
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.5
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.