CVE-2023-20198Monday, January 12, 2026

Cisco IOS XE Web UI Authentication Bypass and Privilege Escalation

A critical vulnerability in the web UI of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass authentication and gain privileged access to the affected system. This vulnerability exists due to improper authentication controls in the web UI feature.

Not KEV Listed✓ Fix Available
Cisco IOS XE Web UI Authentication Bypass and Privilege Escalation
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

This is a very serious security flaw in Cisco's networking equipment software (IOS XE) that lets attackers completely bypass the login screen of the web interface. It's like having a door lock that can be opened without any key.

Once attackers get through this broken authentication, they gain full administrative access to the device - meaning they can change any settings, view sensitive information, or use the device to attack other systems. This is particularly dangerous because these Cisco devices are often used in important business and infrastructure networks.

The vulnerability became widely known in October 2023 and was actively exploited by malicious actors, making it one of the most significant network security issues of 2023.

Affected Products

1affected product identified
ProductVendorVersionPatched
>IOS XECisco17.0.0 through 17.9.317.9.4
🔧

Remediation

Fix Available

1. Immediately upgrade to a fixed software version (17.9.4 or later)

2. Disable the web UI feature if not required

3. Implement access control lists (ACLs) to restrict management interface access

4. Monitor for suspicious activities and unauthorized access

5. Reset all local credentials after applying fixes

🔗

Sources & References

CVSS Score
10.0
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2023-20198
Severitycritical
FixAvailable
KEVNot Listed
PublishedJan 12, 2026