Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Cisco IOS XE Web UI Privilege Escalation Actively Exploited
Cisco IOS XE Web UI Privilege Escalation Actively Exploited
SECURITYHIGHCVE-2026-2134

Cisco IOS XE Web UI Privilege Escalation Actively Exploited

Cisco discloses a high-severity privilege escalation vulnerability in IOS XE Web UI that allows authenticated users to gain root access. Active...

Dylan H.

Security Team

February 8, 2026
4 min read

Affected Products

  • Cisco IOS XE 17.9.x
  • Cisco IOS XE 17.12.x
  • Cisco Catalyst Switches
  • Cisco ISR Routers

Executive Summary

Cisco has released an emergency advisory for CVE-2026-2134, a high-severity privilege escalation vulnerability in the IOS XE Web UI. An authenticated attacker with read-only access can exploit the flaw to gain root-level command execution on affected devices. Cisco's PSIRT has confirmed active exploitation in the wild.

CVSS Score: 8.8


Vulnerability Overview

Root Cause

The vulnerability resides in the web-based management interface of Cisco IOS XE. Insufficient authorization checks in the REST API endpoints allow a user with Level 1 (read-only) privileges to execute commands at Level 15 (privileged EXEC) through crafted API requests.

Attack Chain

1. Attacker authenticates to IOS XE Web UI with low-privilege credentials
2. Sends crafted REST API request to /restconf/data/Cisco-IOS-XE-native:native
3. Authorization bypass allows command injection at privilege level 15
4. Attacker creates new admin account or modifies device configuration
5. Persistent backdoor established on network device

Technical Details

Affected Versions

IOS XE VersionAffectedFixed Version
17.12.1 - 17.12.3Yes17.12.4
17.9.1 - 17.9.5Yes17.9.5a
17.6.xNot affectedN/A
17.3.xNot affectedN/A

Affected Platforms

  • Cisco Catalyst 9200, 9300, 9400, 9500, 9600 Series Switches
  • Cisco Catalyst 8200, 8300, 8500 Series Edge Platforms
  • Cisco ISR 1000, 4000 Series Routers
  • Cisco ASR 1000 Series Routers

CVSS v3.1 Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Indicators of Compromise

Check for Unauthorized Users

# Show all local users
show running-config | include username

# Check for recently created accounts
show aaa local user all

# Look for unauthorized privilege level 15 users
show running-config | include privilege 15

Check Web UI Access Logs

# Review HTTP server logs
show ip http server session-module

# Check for unusual API calls
show logging | include restconf

# Verify no implants
show platform software audit all

Network Indicators

  • Unusual RESTCONF API calls from unexpected source IPs
  • New local user accounts created on network devices
  • Configuration changes outside maintenance windows
  • Unexpected ACL modifications

Immediate Remediation

Option 1: Patch (Recommended)

Upgrade to the fixed IOS XE version:

# From IOS XE CLI
copy tftp://server/iosxe-17.12.4.SPA.bin flash:
install add file flash:iosxe-17.12.4.SPA.bin activate commit

Option 2: Disable Web UI (Immediate Workaround)

# Disable HTTP and HTTPS servers
configure terminal
no ip http server
no ip http secure-server
end
write memory

Note: This disables all web-based management. CLI/SSH management remains available.

Option 3: Restrict Web UI Access

# Create ACL to restrict Web UI access
ip access-list standard WEB-MGMT-ONLY
 permit 10.0.0.0 0.0.0.255
 permit 172.16.1.0 0.0.0.255
 deny any

# Apply to HTTP server
ip http access-class WEB-MGMT-ONLY
ip http secure-server access-class WEB-MGMT-ONLY

Detection Rules

Syslog Monitoring

Monitor for these syslog patterns:

%WEBUI-6-INSTALL_OPERATION: User 'readonly_user' performed configuration change via RESTCONF
%SYS-5-CONFIG_I: Configured from restconf by readonly_user
%AAA-5-USER_PRIV: User 'readonly_user' privilege changed from 1 to 15

SIEM Detection Query (Splunk)

index=network sourcetype=cisco:ios
("RESTCONF" OR "restconf") AND ("privilege" OR "CONFIG_I" OR "USER_PRIV")
| where user_priv_level < 15 AND action="configuration_change"
| stats count by src_ip, user, action

Vendor Response

Cisco PSIRT released the advisory on February 7, 2026 and:

  • Published fixed software for all affected trains
  • Released Cisco IOS XE Software Integrity Verification tools
  • Provided indicators of compromise
  • Coordinated with CISA for KEV inclusion

References

  • Cisco Security Advisory — CVE-2026-2134
  • Cisco IOS XE Software Integrity Assurance
  • CISA KEV Catalog
#Cisco#IOS XE#Privilege Escalation#Network Infrastructure#Router#Switch

Related Articles

Tenda A15 UploadCfg Stack Buffer Overflow (CVE-2026-4567)

A CVSS 9.8 Critical stack-based buffer overflow in Tenda A15 firmware 15.13.07.13 allows unauthenticated remote attackers to execute arbitrary code by...

5 min read

CVE-2026-3629: WordPress User Import Plugin Privilege Escalation

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to 1.29.7, allowing authenticated...

5 min read

D-Link DHP-1320 SOAP Handler Stack Buffer Overflow (CVE-2026-4529)

A CVSS 8.8 stack-based buffer overflow in D-Link DHP-1320 firmware 1.00WWB04 allows unauthenticated remote attackers to execute arbitrary code via a...

5 min read
Back to all Security Alerts