A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device.

This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges.

Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.

Project Subscriptions

Vendors Products
Catalyst 9105ax Subscribe
Catalyst 9105axi Subscribe
Catalyst 9105axw Subscribe
Catalyst 9115ax Subscribe
Catalyst 9115axe Subscribe
Catalyst 9115axi Subscribe
Catalyst 9117ax Subscribe
Catalyst 9117axi Subscribe
Catalyst 9120ax Subscribe
Catalyst 9120axe Subscribe
Catalyst 9120axi Subscribe
Catalyst 9120axp Subscribe
Catalyst 9124ax Subscribe
Catalyst 9124axd Subscribe
Catalyst 9124axi Subscribe
Catalyst 9130ax Subscribe
Catalyst 9130axe Subscribe
Catalyst 9130axi Subscribe
Catalyst 9300 Subscribe
Catalyst 9300-24p-a Subscribe
Catalyst 9300-24p-e Subscribe
Catalyst 9300-24s-a Subscribe
Catalyst 9300-24s-e Subscribe
Catalyst 9300-24t-a Subscribe
Catalyst 9300-24t-e Subscribe
Catalyst 9300-24u-a Subscribe
Catalyst 9300-24u-e Subscribe
Catalyst 9300-24ux-a Subscribe
Catalyst 9300-24ux-e Subscribe
Catalyst 9300-48p-a Subscribe
Catalyst 9300-48p-e Subscribe
Catalyst 9300-48s-a Subscribe
Catalyst 9300-48s-e Subscribe
Catalyst 9300-48t-a Subscribe
Catalyst 9300-48t-e Subscribe
Catalyst 9300-48u-a Subscribe
Catalyst 9300-48u-e Subscribe
Catalyst 9300-48un-a Subscribe
Catalyst 9300-48un-e Subscribe
Catalyst 9300-48uxm-a Subscribe
Catalyst 9300-48uxm-e Subscribe
Catalyst 9300l Subscribe
Catalyst 9300l-24p-4g-a Subscribe
Catalyst 9300l-24p-4g-e Subscribe
Catalyst 9300l-24p-4x-a Subscribe
Catalyst 9300l-24p-4x-e Subscribe
Catalyst 9300l-24t-4g-a Subscribe
Catalyst 9300l-24t-4g-e Subscribe
Catalyst 9300l-24t-4x-a Subscribe
Catalyst 9300l-24t-4x-e Subscribe
Catalyst 9300l-48p-4g-a Subscribe
Catalyst 9300l-48p-4g-e Subscribe
Catalyst 9300l-48p-4x-a Subscribe
Catalyst 9300l-48p-4x-e Subscribe
Catalyst 9300l-48t-4g-a Subscribe
Catalyst 9300l-48t-4g-e Subscribe
Catalyst 9300l-48t-4x-a Subscribe
Catalyst 9300l-48t-4x-e Subscribe
Catalyst 9300l Stack Subscribe
Catalyst 9300lm Subscribe
Catalyst 9300x Subscribe
Catalyst 9400 Subscribe
Catalyst 9407r Subscribe
Catalyst 9410r Subscribe
Catalyst 9500 Subscribe
Catalyst 9500h Subscribe
Catalyst 9800 Subscribe
Catalyst 9800-40 Subscribe
Catalyst 9800-80 Subscribe
Catalyst 9800-cl Subscribe
Catalyst 9800-l Subscribe
Catalyst 9800-l-c Subscribe
Catalyst 9800-l-f Subscribe
Ios Xe Software Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24410 A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Dec 2025 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'No', 'Exploitation': 'None', 'Technical Impact': 'Total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco ios Xe Software
CPEs cpe:2.3:a:cisco:ios_xe_software:*:*:*:*:*:*:*:*
Vendors & Products Cisco ios Xe Software
Metrics ssvc

{'options': {'Automatable': 'No', 'Exploitation': 'None', 'Technical Impact': 'Total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2025-12-16T18:23:20.501Z

Reserved: 2022-10-27T18:47:50.369Z

Link: CVE-2023-20231

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:36.687Z

cve-icon NVD

Status : Modified

Published: 2023-09-27T18:15:11.430

Modified: 2024-11-21T07:40:57.000

Link: CVE-2023-20231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses