This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco IOS XE Software and have both a lobby ambassador account and the HTTP server feature enabled:
- Catalyst 9800-CL Wireless Controllers for Cloud
- Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches
- Catalyst 9800 Series Wireless Controllers
- Embedded Wireless Controller on Catalyst 9100X Series Access Points
- Integrated access points (APs) in Integrated Service Routers (ISR)1100 (Wi-Fi 6)
- Wi-Fi 6 pluggable module for Catalyst IR1800 Rugged Series Routers
For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory.
Determine the Device Configuration
Cisco IOS XE Software is only affected by this vulnerability if an affected device is configured with a lobby ambassador account. This is not a default configuration and must be added by an administrator. To determine whether the lobby ambassador account and the HTTP server feature are configured on a device, use the following instructions.
Determine the Lobby Ambassador Account Configuration
To determine how many lobby ambassador accounts are configured on a device, log in to the device and run the show running-config | count type lobby-admin CLI command. The following example shows the CLI output on a device that has one lobby ambassador account configured:
Router#show running-config | count type lobby-admin
Number of lines which match regexp = 1
The number at the end of the line indicates how many lobby ambassador accounts are configured on the device. If the number is zero and the device is not using authentication, authorization, and accounting (AAA), it is not affected by this vulnerability.
Note: The lobby ambassador role can be associated with a user account by using RADIUS or TACACS+. Customers who are using an AAA server such as Cisco Identity Services Engine (ISE) to manage user accounts that are accessing their device should check for the presence of users that have the cisco-av-pair=lobby-admin attribute set. For an example of how to configure a lobby ambassador account on Cisco ISE, see Configure 9800 WLC Lobby Ambassador with RADIUS and TACACS+ Authentication.
Determine the HTTP Server Configuration
To determine whether the HTTP Server feature is enabled for a device, log in to the device and use the show running-config | include ip http server|secure|active command in the CLI to check for the presence of the ip http server command or the ip http secure-server command in the global configuration. If either command is present, the HTTP Server feature is enabled for the device.
The following example shows the output of the show running-config | include ip http server|secure|active command for a device that has the HTTP Server feature enabled:
Router# show running-config | include ip http server|secure|active
ip http server
ip http secure-server
Note: The presence of either command or both commands in the device configuration indicates that the web UI feature is enabled.
If the ip http server command is present and the configuration also contains ip http active-session-modules none, the vulnerability is not exploitable over HTTP.
If the ip http secure-server command is present and the configuration also contains ip http secure-active-session-modules none, the vulnerability is not exploitable over HTTPS.