Only devices that have been configured for the WebVPN Enhancements feature (Cisco IOS SSLVPN) are affected by this vulnerability.
To determine whether a device is enabled for WebVPN, the preferred method is to issue the show webvpn gateway
EXEC command. A device is affected if it is running the vulnerable software and the configuration lists the Admin
statuses of any configured gateway as up
In the following example, the device has a single WebVPN gateway configured called ssl-vpn
. The gateway is up and accepting connections
Router#show webvpn gateway
Gateway Name Admin Operation
------------ ----- ---------
ssl-vpn up up
Administrators may also perform a configuration check by issuing the following EXEC commands, show running-config | include webvpn
. If the device returns any output this means that SSLVPN is configured on the device and the device may be vulnerable. If the output from show running-config | include webvpn
contains webvpn gateway <word>,
then the device is configured to support the Cisco IOS SSLVPN feature. A device is vulnerable if it has the inservice
command in at least one of the webvpn gateway
sections. The following example shows a vulnerable device configured with Cisco IOS SSLVPN:
Router# show running-config | include webvpn
webvpn gateway ssl-vpn
ip address 10.1.1.1 port 443
ssl trustpoint Gateway-TP
A device that supports the Cisco IOS SSLVPN is not vulnerable if it does not have a WebVPN gateway configured or all the configured WebVPN gateway entries contain the no inservice
sub-command within the webvpn gateway section.
To determine the Cisco IOS Software release that is running on a Cisco product, administrators can log in to the device and issue the show version command to display the system banner. The system banner confirms that the device is running Cisco IOS Software by displaying text similar to "Cisco Internetwork Operating System Software" or "Cisco IOS Software." The image name displays in parentheses, followed by "Version" and the Cisco IOS Software release name. Other Cisco devices do not have the show version command or may provide different output.
The following example identifies a Cisco product that is running Cisco IOS Software Release 15.2(4)M5 with an installed image name of C3900-UNIVERSALK9-M:
Router> show version
Cisco IOS Software, C3900 Software (C3900-UNIVERSALK9-M), 15.2(4)M5, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Fri 13-Sep-13 16:44 by prod_rel_team
!--- output truncated
Additional information about Cisco IOS Software release naming conventions is available in White Paper: Cisco IOS and NX-OS Software Reference Guide.
Cisco IOS XE Software is not affected by this vulnerability.
Cisco IOS XR Software is not affected by this vulnerability.
Cisco ASA 5500 Series Adaptive Security Appliance is not affected by this vulnerability.
No other Cisco products are currently known to be affected by this vulnerability.