5.3

CVE-2026-20113

Medienbericht
A vulnerability in the web-based Cisco IOx application hosting environment management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user.

 This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to arbitrarily inject log entries, manipulate the structure of log files, or obscure legitimate log events.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco IOS XE Software
Version 16.6.1
Status affected
Version 16.6.2
Status affected
Version 16.6.3
Status affected
Version 16.6.4
Status affected
Version 16.6.5
Status affected
Version 16.6.4a
Status affected
Version 16.6.5a
Status affected
Version 16.6.6
Status affected
Version 16.6.7
Status affected
Version 16.6.8
Status affected
Version 16.6.9
Status affected
Version 16.6.10
Status affected
Version 16.7.1
Status affected
Version 16.7.1a
Status affected
Version 16.7.1b
Status affected
Version 16.7.2
Status affected
Version 16.7.3
Status affected
Version 16.7.4
Status affected
Version 16.8.1
Status affected
Version 16.8.1a
Status affected
Version 16.8.1b
Status affected
Version 16.8.1s
Status affected
Version 16.8.1c
Status affected
Version 16.8.1d
Status affected
Version 16.8.2
Status affected
Version 16.8.1e
Status affected
Version 16.8.3
Status affected
Version 16.9.1
Status affected
Version 16.9.2
Status affected
Version 16.9.1a
Status affected
Version 16.9.1b
Status affected
Version 16.9.1s
Status affected
Version 16.9.3
Status affected
Version 16.9.4
Status affected
Version 16.9.5
Status affected
Version 16.9.5f
Status affected
Version 16.9.6
Status affected
Version 16.9.7
Status affected
Version 16.9.8
Status affected
Version 16.10.1
Status affected
Version 16.10.1a
Status affected
Version 16.10.1b
Status affected
Version 16.10.1s
Status affected
Version 16.10.1c
Status affected
Version 16.10.1e
Status affected
Version 16.10.1d
Status affected
Version 16.10.2
Status affected
Version 16.10.1f
Status affected
Version 16.10.1g
Status affected
Version 16.10.3
Status affected
Version 16.11.1
Status affected
Version 16.11.1a
Status affected
Version 16.11.1b
Status affected
Version 16.11.2
Status affected
Version 16.11.1s
Status affected
Version 16.12.1
Status affected
Version 16.12.1s
Status affected
Version 16.12.1a
Status affected
Version 16.12.1c
Status affected
Version 16.12.1w
Status affected
Version 16.12.2
Status affected
Version 16.12.1y
Status affected
Version 16.12.2a
Status affected
Version 16.12.3
Status affected
Version 16.12.8
Status affected
Version 16.12.2s
Status affected
Version 16.12.1x
Status affected
Version 16.12.1t
Status affected
Version 16.12.4
Status affected
Version 16.12.3s
Status affected
Version 16.12.3a
Status affected
Version 16.12.4a
Status affected
Version 16.12.5
Status affected
Version 16.12.6
Status affected
Version 16.12.1z1
Status affected
Version 16.12.5a
Status affected
Version 16.12.5b
Status affected
Version 16.12.1z2
Status affected
Version 16.12.6a
Status affected
Version 16.12.7
Status affected
Version 16.12.10a
Status affected
Version 16.12.11
Status affected
Version 17.1.1
Status affected
Version 17.1.1a
Status affected
Version 17.1.1s
Status affected
Version 17.1.1t
Status affected
Version 17.1.3
Status affected
Version 17.2.1
Status affected
Version 17.2.1r
Status affected
Version 17.2.1a
Status affected
Version 17.2.1v
Status affected
Version 17.2.2
Status affected
Version 17.2.3
Status affected
Version 17.3.1
Status affected
Version 17.3.2
Status affected
Version 17.3.3
Status affected
Version 17.3.1a
Status affected
Version 17.3.1w
Status affected
Version 17.3.2a
Status affected
Version 17.3.1x
Status affected
Version 17.3.1z
Status affected
Version 17.3.4
Status affected
Version 17.3.5
Status affected
Version 17.3.4a
Status affected
Version 17.3.6
Status affected
Version 17.3.4b
Status affected
Version 17.3.4c
Status affected
Version 17.3.5a
Status affected
Version 17.3.5b
Status affected
Version 17.3.7
Status affected
Version 17.3.8
Status affected
Version 17.3.8a
Status affected
Version 17.4.1
Status affected
Version 17.4.2
Status affected
Version 17.4.1a
Status affected
Version 17.4.1b
Status affected
Version 17.4.2a
Status affected
Version 17.5.1
Status affected
Version 17.5.1a
Status affected
Version 17.6.1
Status affected
Version 17.6.2
Status affected
Version 17.6.1w
Status affected
Version 17.6.1a
Status affected
Version 17.6.1x
Status affected
Version 17.6.3
Status affected
Version 17.6.1y
Status affected
Version 17.6.1z
Status affected
Version 17.6.3a
Status affected
Version 17.6.4
Status affected
Version 17.6.1z1
Status affected
Version 17.6.5
Status affected
Version 17.6.6
Status affected
Version 17.6.6a
Status affected
Version 17.6.5a
Status affected
Version 17.6.7
Status affected
Version 17.6.8
Status affected
Version 17.6.8a
Status affected
Version 17.7.1
Status affected
Version 17.7.1a
Status affected
Version 17.7.1b
Status affected
Version 17.7.2
Status affected
Version 17.10.1
Status affected
Version 17.10.1a
Status affected
Version 17.10.1b
Status affected
Version 17.8.1
Status affected
Version 17.8.1a
Status affected
Version 17.9.1
Status affected
Version 17.9.1w
Status affected
Version 17.9.2
Status affected
Version 17.9.1a
Status affected
Version 17.9.1x
Status affected
Version 17.9.1y
Status affected
Version 17.9.3
Status affected
Version 17.9.2a
Status affected
Version 17.9.1x1
Status affected
Version 17.9.3a
Status affected
Version 17.9.4
Status affected
Version 17.9.1y1
Status affected
Version 17.9.5
Status affected
Version 17.9.4a
Status affected
Version 17.9.5a
Status affected
Version 17.9.5b
Status affected
Version 17.9.6
Status affected
Version 17.9.6a
Status affected
Version 17.9.7
Status affected
Version 17.9.5e
Status affected
Version 17.9.5f
Status affected
Version 17.9.8
Status affected
Version 17.9.7a
Status affected
Version 17.9.7b
Status affected
Version 17.11.1
Status affected
Version 17.11.1a
Status affected
Version 17.12.1
Status affected
Version 17.12.1w
Status affected
Version 17.12.1a
Status affected
Version 17.12.1x
Status affected
Version 17.12.2
Status affected
Version 17.12.3
Status affected
Version 17.12.2a
Status affected
Version 17.12.1y
Status affected
Version 17.12.1z
Status affected
Version 17.12.4
Status affected
Version 17.12.3a
Status affected
Version 17.12.1z1
Status affected
Version 17.12.1z2
Status affected
Version 17.12.4a
Status affected
Version 17.12.5
Status affected
Version 17.12.4b
Status affected
Version 17.12.1z3
Status affected
Version 17.12.5a
Status affected
Version 17.12.1z4
Status affected
Version 17.12.6
Status affected
Version 17.12.5b
Status affected
Version 17.12.5c
Status affected
Version 17.12.6a
Status affected
Version 17.12.5d
Status affected
Version 17.12.1z5
Status affected
Version 17.12.1z6
Status affected
Version 17.12.6b
Status affected
Version 17.13.1
Status affected
Version 17.13.1a
Status affected
Version 17.14.1
Status affected
Version 17.14.1a
Status affected
Version 17.15.1
Status affected
Version 17.15.1w
Status affected
Version 17.15.1a
Status affected
Version 17.15.2
Status affected
Version 17.15.1b
Status affected
Version 17.15.1x
Status affected
Version 17.15.1z
Status affected
Version 17.15.3
Status affected
Version 17.15.2c
Status affected
Version 17.15.2a
Status affected
Version 17.15.1y
Status affected
Version 17.15.2b
Status affected
Version 17.15.3a
Status affected
Version 17.15.4
Status affected
Version 17.15.3b
Status affected
Version 17.15.4d
Status affected
Version 17.15.4e
Status affected
Version 17.16.1
Status affected
Version 17.16.1a
Status affected
Version 17.17.1
Status affected
Version 17.18.1
Status affected
Version 17.18.1w
Status affected
Version 17.18.1a
Status affected
Version 17.18.1x
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.069
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection')

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.