...
A vulnerability in the REST API of the web-based user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass authentication to the REST API of the web-based user interface of the affected device. The vulnerability is due to insufficient input validation for the REST API. An attacker could exploit this vulnerability by sending a malicious API request to the affected device. A successful exploit could allow the attacker to bypass authentication and gain access to the web-based user interface. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ciscosa-20170927-restapi This advisory is part of the September 27, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see the '' Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication'' which is available at http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-63410
This vulnerability affects Cisco devices that are running a vulnerable release of a Cisco IOS XE. See the published advisory for more information. Please see the Cisco IOS and Cisco IOS XE Software Checker tool for information on non-vulnerable, vulnerable and fixed releases. This tool is available at http://tools.cisco.com/security/center/selectIOSVersion.x
See published advisory
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 3 score. The Base CVSS score as of the time of evaluation is 10: https://tools.cisco.com/security/center/cvssCalculator.x?version=3.0&vector=CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:X/RL:X/RC:X CVE ID CVE-2017-12229 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html