Heads up networking friends!
On October 16th, Cisco announced a Zero-Day vulnerability whereby if the Web UI feature is enabled and the device is exposed to the internet or untrusted networks it can result in an unauthenticated attacker being able to create an account on the affected device and then use the privileges afforded by that account to take control of the device.
More from NIST here on 🪲 CVE-2023-20198.
Quickly identify Cisco IOS-XE Devices in your network in SevOne NPM:
Our SevOne NPM users can help quickly generate a list of Cisco IOS-XE devices known to the network by navigating to Devices tab in Data Insight and filter by Device Group > Operating Systems > Cisco IOS-XE
or type in the table search bar "IOS-XE"
to return a list of devices running Cisco IOS-XE software. From here you can drill down into specific devices or export the list CSV to share with other teams.

Analyze traffic further with Flow Analysis
If these network devices have flow enabled, a quick next step to search for any oddities is to analyze flow records specifically for HTTP ports 443
and 80
. In the below report, I am showing filtered results for HTTP with country of origin, port and BGP ASN to see if any "unusual" traffic is noticed. Further analysis can be done on the group of Cisco IOS-XE devices to view CPU, Memory or alerts anomalies as needed.

Good luck and safe packet pushing!
- Brendan