Vulnerable Products:
This vulnerability affects the following Cisco Industrial Ethernet Series Switches if they are running a vulnerable release of Cisco IOS Software and have HTTP enabled:
IE 2000 Series IE 4000 Series IE 4010 Series IE 5000 Series
For information about which Cisco software releases are vulnerable, see the Fixed Software ["#fs"] section of this advisory. Determine the HTTP Server Configuration To determine whether the HTTP Server feature is enabled for a device, log in to the device and use the show running-config | include ip http server|secure|active command in the CLI to check for the presence of the ip http server command or the ip http secure-server command in the global configuration. If either command is present, the HTTP Server feature is enabled for the device.
The following example shows the output of the show running-config | include ip http server|secure|active command for a device that has the HTTP Server feature enabled:
Router# show running-config | include ip http server|secure|active ip http server ip http secure-server
Note: The presence of either command or both commands in the device configuration indicates that the HTTP server feature is enabled.Products Confirmed Not Vulnerable:
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following Cisco products:
IOS Software running on devices not listed in the Vulnerable Products ["#vp"] section of this advisory IOS XE Software IOS XR Software Meraki products NX-OS SoftwareWorkarounds:
There are no workarounds that address this vulnerability. However, there is a mitigation.
Disabling the HTTP Server feature eliminates the attack vector for this vulnerability and may be a suitable mitigation until affected devices can be upgraded. To disable the HTTP Server feature, use the no ip http server or no...
15.0(2)EA15.0(2)EA115.0(2)EK15.0(2)EK115.0(2)SE815.2(1)EY15.2(2)E15.2(2)E115.2(2)E1015.2(2)E2+68 moreExploitability
AV:NAC:LPR:LUI:NScope
S:UImpact
C:LI:HA:H8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H