IceBreakerCode / CVE-2023-20198

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

πŸ” Cisco IOS XE Web UI Vulnerability Scanner - CVE-2023-20198 🚨


🚫 Critical Risk | CVSS: 10.0 | πŸ“… Updated: Oct 17, 2023


Overview:

A swift and powerful scanner for detecting critical vulnerabilities in the web UI of Cisco IOS XE Software. Protect your system from unauthorized level 15 access, putting control at risk!

🌟 Features:

  • πŸ“Œ Spot potential implants for system-level commands.
  • ⚑ Speedy multi-threaded scanning.
  • πŸ“ Clean logs for effortless analysis.

πŸ“Œ Context:

  • Affected: Cisco IOS XE Software with web UI enabled.
  • Current Threat: Active exploitations. Watch out for "cisco_tac_admin" and "cisco_support"!
  • Advice: Turn off HTTP Server for internet-facing setups. Limit to trusted networks only.
  • Dangers: Compromised devices risk traffic surveillance, network manipulation, and more.

πŸ”— Official Cisco Advisory


πŸ›  How to Use:

  1. Run the Python script.
  2. Provide target subnet or IP (e.g., X.X.X.X/24).
  3. Results in scan_results.txt & terminal.
  4. Ensure all Python prerequisites & right permissions.

⚠️ Important:

Double-check devices with potential vulnerabilities. Consult an expert if unsure about findings.


πŸ“ Legal Notice:

For educational & informational use only. Unauthorized scanning is illegal. Get consent before scanning. The developer & contributors aren't responsible for misuse. Act responsibly.


πŸ‘₯ Credits:

  • πŸ–‹οΈ Dev: @IceBreakerCode
  • πŸ“Œ CVE Info: Cisco's official advisory

πŸ™Œ Join Us! Your contributions to enhance this tool are welcome. We'll honor your efforts here!

πŸ”’ Safety First: Scan only networks you're permitted to assess.

πŸ”— Stay Informed: Official Cisco Advisory for updates & fixes.

About


Languages

Language:Python 100.0%