Rapid7 Vulnerability & Exploit Database

Cisco IOS HTTP Configuration Arbitrary Administrative Access Vulnerability

Back to Search

Cisco IOS HTTP Configuration Arbitrary Administrative Access Vulnerability

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/21/2001
Created
07/25/2018
Added
11/01/2004
Modified
12/04/2013

Description

IOS is router firmware developed and distributed by Cisco Systems. IOS functions on numerous Cisco devices, including routers and switches. A problem with the Cisco firmware makes it possible for a remote user to gain elevated privileges. This vulnerability can be exploited by attackers to gain full administrative access on the affect device, allowing a remote user to reconfigure devices using the affected firmware.

The problem is in the ability of a user to access the HTTP configuration menu of a Cisco device. A remote user accessing: http://router.address/level/$NUMBER/exec/.... (where $NUMBER is a number in the range of 16 to 99) bypasses all authentication checking. This leads to a remote user gaining a privilege level of 15, which in IOS software is full administrative access (also known as enable). With administrative access, remote attackers may be able to further compromise the network. They may be able to, for example: divert/redirect traffic, possibly monitor traffic, and/or cause a denial of service

Solution(s)

  • cisco-ios-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;