Cisco IOx Application Hosting Environment Carriage Return Line Feed Injection Vulnerability
A vulnerability in the IOx application hosting environment management interface allows an unauthenticated, remote attacker to inject carriage return and line feed characters via crafted packets. The interface does not properly validate user input. A successful exploit could allow the attacker to inject false log entries, corrupt log files, or obscure legitimate log events, impairing audit and forensic capabilities. Affected versions: IOS XE 16.10.1 through 17.9.8. Cisco has released software updates to address this vulnerability.
- Network access to the IOx management interface (typically port 80 or 443)
- The affected IOS XE version must be running and have IOx enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/25ebf95a-a257-48e8-b58f-6f852cd7bd06Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.