Thursday, May 22, 2025
HomeCiscoCisco IOS XE Software Vulnerabilities Let Hackers Gain Root Access in...

Cisco IOS XE Software Vulnerabilities Let Hackers Gain Root Access in Cisco Devices

Published on

SIEM as a Service

Follow Us on Google News

Cisco released a security update for multiple vulnerabilities that affected Cisco IOS XE Software web-based user interface (Web UI) that allows a remote attacker to execute commands with elevated privileges on the vulnerable system.

Cisco IOS XE Software is an internetworking operating system for enterprise networks and is using in several Cisco devices such as Some Cisco routers (such as ASR 1000) and some Catalyst switches (such as 3850).

This Vulnerable software running Cicso deployed in various Enterprise Networks, data centers, and smaller businesses and the potential attacker exploit the vulnerable devices remotely.

- Advertisement - Google News

According to the Cisco update, These two ( CVE-2019-12650) ( CVE-2019-12651 ) vulnerabilities are not dependent on one another and the attacker no need to exploit one vulnerability to take over another vulnerability.

Both vulnerabilities affected Cisco devices that running vulnerable IOS XE Software release with the HTTP Server feature enabled.

Command Injection Vulnerabilities

A first vulnerability (CVE-2019-12651) with web-based user interface (Web UI) of Cisco IOS XE Software allows low privileged attackers possibly execute the arbitrary command on the vulnerable devices that running with Cisco IOS to elevate privileges.

Another vulnerability (CVE-2019-12650) that affected the web-based user interface (Web UI) due to improperly sanitizes user-supplied input of Cisco IOS XE Software allows remote attackers to execute commands on the underlying Linux shell of vulnerable devices and gain the root access.

According to the Cisco security update, Due to the improperly sanitizes user-supplied input in Cisco IOS, an attacker could exploit this vulnerabilities by supplying a crafted input parameter on a form in the Web UI and then submitting that form.

Customers recommended to disabling the HTTP Server feature eliminates the attack vector for these vulnerabilities until upgrade the system and apply the patch released by Cisco.

Following command will help to check and shows the output will confirm that it has the HTTP Server feature enabled.

Router# show running-config | include ip http server|secure-server
ip http server
ip http secure-server

If you find the presence of either command indicate that the HTTP Server feature is enabled.

If both http server and http-secure server are in use, then both commands are required to disable the HTTP Server feature.

In this case, Cisco adviced to using the following command in global configuration mode. no ip http server or no ip http secure-server.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Also Read: Top 7 Vulnerability Database Sources to Trace New Vulnerabilities

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram

A newly identified .NET-based information-stealing malware, dubbed PupkinStealer (also known as PumpkinStealer in some...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

PoC Code Published for Linux nftables Security Vulnerability

Security researchers have published proof-of-concept (PoC) exploit code for CVE-2024-26809, a high-severity double-free vulnerability in...

Cisco IOS XE Vulnerability Allows Attackers to Gain Elevated Privileges

Cisco has issued an urgent security advisory (ID: cisco-sa-iosxe-privesc-su7scvdp) following the discovery of multiple...

Cisco IOS, XE, and XR Vulnerability Allows Remote Device Reboots

 Cisco has issued an urgent security advisory (cisco-sa-twamp-kV4FHugn) warning of a critical vulnerability in...