CVE-2026-20113 (GCVE-0-2026-20113)
Vulnerability from cvelistv5 – Published: 2026-03-25 16:08 – Updated: 2026-03-27 15:02
VLAI?
Summary
A vulnerability in the web-based Cisco IOx application hosting environment management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to arbitrarily inject log entries, manipulate the structure of log files, or obscure legitimate log events.
Severity ?
5.3 (Medium)
CWE
- CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software |
Affected:
16.6.1
Affected: 16.6.2 Affected: 16.6.3 Affected: 16.6.4 Affected: 16.6.5 Affected: 16.6.4a Affected: 16.6.5a Affected: 16.6.6 Affected: 16.6.7 Affected: 16.6.8 Affected: 16.6.9 Affected: 16.6.10 Affected: 16.7.1 Affected: 16.7.1a Affected: 16.7.1b Affected: 16.7.2 Affected: 16.7.3 Affected: 16.7.4 Affected: 16.8.1 Affected: 16.8.1a Affected: 16.8.1b Affected: 16.8.1s Affected: 16.8.1c Affected: 16.8.1d Affected: 16.8.2 Affected: 16.8.1e Affected: 16.8.3 Affected: 16.9.1 Affected: 16.9.2 Affected: 16.9.1a Affected: 16.9.1b Affected: 16.9.1s Affected: 16.9.3 Affected: 16.9.4 Affected: 16.9.5 Affected: 16.9.5f Affected: 16.9.6 Affected: 16.9.7 Affected: 16.9.8 Affected: 16.10.1 Affected: 16.10.1a Affected: 16.10.1b Affected: 16.10.1s Affected: 16.10.1c Affected: 16.10.1e Affected: 16.10.1d Affected: 16.10.2 Affected: 16.10.1f Affected: 16.10.1g Affected: 16.10.3 Affected: 16.11.1 Affected: 16.11.1a Affected: 16.11.1b Affected: 16.11.2 Affected: 16.11.1s Affected: 16.12.1 Affected: 16.12.1s Affected: 16.12.1a Affected: 16.12.1c Affected: 16.12.1w Affected: 16.12.2 Affected: 16.12.1y Affected: 16.12.2a Affected: 16.12.3 Affected: 16.12.8 Affected: 16.12.2s Affected: 16.12.1x Affected: 16.12.1t Affected: 16.12.4 Affected: 16.12.3s Affected: 16.12.3a Affected: 16.12.4a Affected: 16.12.5 Affected: 16.12.6 Affected: 16.12.1z1 Affected: 16.12.5a Affected: 16.12.5b Affected: 16.12.1z2 Affected: 16.12.6a Affected: 16.12.7 Affected: 16.12.10a Affected: 16.12.11 Affected: 17.1.1 Affected: 17.1.1a Affected: 17.1.1s Affected: 17.1.1t Affected: 17.1.3 Affected: 17.2.1 Affected: 17.2.1r Affected: 17.2.1a Affected: 17.2.1v Affected: 17.2.2 Affected: 17.2.3 Affected: 17.3.1 Affected: 17.3.2 Affected: 17.3.3 Affected: 17.3.1a Affected: 17.3.1w Affected: 17.3.2a Affected: 17.3.1x Affected: 17.3.1z Affected: 17.3.4 Affected: 17.3.5 Affected: 17.3.4a Affected: 17.3.6 Affected: 17.3.4b Affected: 17.3.4c Affected: 17.3.5a Affected: 17.3.5b Affected: 17.3.7 Affected: 17.3.8 Affected: 17.3.8a Affected: 17.4.1 Affected: 17.4.2 Affected: 17.4.1a Affected: 17.4.1b Affected: 17.4.2a Affected: 17.5.1 Affected: 17.5.1a Affected: 17.6.1 Affected: 17.6.2 Affected: 17.6.1w Affected: 17.6.1a Affected: 17.6.1x Affected: 17.6.3 Affected: 17.6.1y Affected: 17.6.1z Affected: 17.6.3a Affected: 17.6.4 Affected: 17.6.1z1 Affected: 17.6.5 Affected: 17.6.6 Affected: 17.6.6a Affected: 17.6.5a Affected: 17.6.7 Affected: 17.6.8 Affected: 17.6.8a Affected: 17.7.1 Affected: 17.7.1a Affected: 17.7.1b Affected: 17.7.2 Affected: 17.10.1 Affected: 17.10.1a Affected: 17.10.1b Affected: 17.8.1 Affected: 17.8.1a Affected: 17.9.1 Affected: 17.9.1w Affected: 17.9.2 Affected: 17.9.1a Affected: 17.9.1x Affected: 17.9.1y Affected: 17.9.3 Affected: 17.9.2a Affected: 17.9.1x1 Affected: 17.9.3a Affected: 17.9.4 Affected: 17.9.1y1 Affected: 17.9.5 Affected: 17.9.4a Affected: 17.9.5a Affected: 17.9.5b Affected: 17.9.6 Affected: 17.9.6a Affected: 17.9.7 Affected: 17.9.5e Affected: 17.9.5f Affected: 17.9.8 Affected: 17.9.7a Affected: 17.9.7b Affected: 17.11.1 Affected: 17.11.1a Affected: 17.12.1 Affected: 17.12.1w Affected: 17.12.1a Affected: 17.12.1x Affected: 17.12.2 Affected: 17.12.3 Affected: 17.12.2a Affected: 17.12.1y Affected: 17.12.1z Affected: 17.12.4 Affected: 17.12.3a Affected: 17.12.1z1 Affected: 17.12.1z2 Affected: 17.12.4a Affected: 17.12.5 Affected: 17.12.4b Affected: 17.12.1z3 Affected: 17.12.5a Affected: 17.12.1z4 Affected: 17.12.6 Affected: 17.12.5b Affected: 17.12.5c Affected: 17.12.6a Affected: 17.12.5d Affected: 17.12.1z5 Affected: 17.12.1z6 Affected: 17.12.6b Affected: 17.13.1 Affected: 17.13.1a Affected: 17.14.1 Affected: 17.14.1a Affected: 17.15.1 Affected: 17.15.1w Affected: 17.15.1a Affected: 17.15.2 Affected: 17.15.1b Affected: 17.15.1x Affected: 17.15.1z Affected: 17.15.3 Affected: 17.15.2c Affected: 17.15.2a Affected: 17.15.1y Affected: 17.15.2b Affected: 17.15.3a Affected: 17.15.4 Affected: 17.15.3b Affected: 17.15.4d Affected: 17.15.4e Affected: 17.16.1 Affected: 17.16.1a Affected: 17.17.1 Affected: 17.18.1 Affected: 17.18.1w Affected: 17.18.1a Affected: 17.18.1x |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-20113",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-27T15:02:14.431387Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-27T15:02:21.557Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.5f"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.7"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.9.8"
},
{
"status": "affected",
"version": "17.9.7a"
},
{
"status": "affected",
"version": "17.9.7b"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.1z2"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.12.5"
},
{
"status": "affected",
"version": "17.12.4b"
},
{
"status": "affected",
"version": "17.12.1z3"
},
{
"status": "affected",
"version": "17.12.5a"
},
{
"status": "affected",
"version": "17.12.1z4"
},
{
"status": "affected",
"version": "17.12.6"
},
{
"status": "affected",
"version": "17.12.5b"
},
{
"status": "affected",
"version": "17.12.5c"
},
{
"status": "affected",
"version": "17.12.6a"
},
{
"status": "affected",
"version": "17.12.5d"
},
{
"status": "affected",
"version": "17.12.1z5"
},
{
"status": "affected",
"version": "17.12.1z6"
},
{
"status": "affected",
"version": "17.12.6b"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.2"
},
{
"status": "affected",
"version": "17.15.1b"
},
{
"status": "affected",
"version": "17.15.1x"
},
{
"status": "affected",
"version": "17.15.1z"
},
{
"status": "affected",
"version": "17.15.3"
},
{
"status": "affected",
"version": "17.15.2c"
},
{
"status": "affected",
"version": "17.15.2a"
},
{
"status": "affected",
"version": "17.15.1y"
},
{
"status": "affected",
"version": "17.15.2b"
},
{
"status": "affected",
"version": "17.15.3a"
},
{
"status": "affected",
"version": "17.15.4"
},
{
"status": "affected",
"version": "17.15.3b"
},
{
"status": "affected",
"version": "17.15.4d"
},
{
"status": "affected",
"version": "17.15.4e"
},
{
"status": "affected",
"version": "17.16.1"
},
{
"status": "affected",
"version": "17.16.1a"
},
{
"status": "affected",
"version": "17.17.1"
},
{
"status": "affected",
"version": "17.18.1"
},
{
"status": "affected",
"version": "17.18.1w"
},
{
"status": "affected",
"version": "17.18.1a"
},
{
"status": "affected",
"version": "17.18.1x"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based Cisco IOx application hosting environment management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user.\r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to arbitrarily inject log entries, manipulate the structure of log files, or obscure legitimate log events."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that a public announcement is available for the vulnerability that is described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-93",
"description": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-25T16:08:39.046Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iox-crlf-NvgKTKJZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-crlf-NvgKTKJZ"
}
],
"source": {
"advisory": "cisco-sa-iox-crlf-NvgKTKJZ",
"defects": [
"CSCwq69499"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2026-20113",
"datePublished": "2026-03-25T16:08:39.046Z",
"dateReserved": "2025-10-08T11:59:15.375Z",
"dateUpdated": "2026-03-27T15:02:21.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-20113\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2026-03-25T16:16:15.637\",\"lastModified\":\"2026-03-26T15:13:15.790\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the web-based Cisco IOx application hosting environment management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user.\\r\\n\\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to arbitrarily inject log entries, manipulate the structure of log files, or obscure legitimate log events.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-93\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-crlf-NvgKTKJZ\",\"source\":\"psirt@cisco.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-20113\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-27T15:02:14.431387Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-27T15:02:18.243Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCwq69499\"], \"advisory\": \"cisco-sa-iox-crlf-NvgKTKJZ\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS XE Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"16.6.1\"}, {\"status\": \"affected\", \"version\": \"16.6.2\"}, {\"status\": \"affected\", \"version\": \"16.6.3\"}, {\"status\": \"affected\", \"version\": \"16.6.4\"}, {\"status\": \"affected\", \"version\": \"16.6.5\"}, {\"status\": \"affected\", \"version\": \"16.6.4a\"}, {\"status\": \"affected\", \"version\": \"16.6.5a\"}, {\"status\": \"affected\", \"version\": \"16.6.6\"}, {\"status\": \"affected\", \"version\": \"16.6.7\"}, {\"status\": \"affected\", \"version\": \"16.6.8\"}, {\"status\": \"affected\", \"version\": \"16.6.9\"}, {\"status\": \"affected\", \"version\": \"16.6.10\"}, {\"status\": \"affected\", \"version\": \"16.7.1\"}, {\"status\": \"affected\", \"version\": \"16.7.1a\"}, {\"status\": \"affected\", \"version\": \"16.7.1b\"}, {\"status\": \"affected\", \"version\": \"16.7.2\"}, {\"status\": \"affected\", \"version\": \"16.7.3\"}, {\"status\": \"affected\", \"version\": \"16.7.4\"}, {\"status\": \"affected\", \"version\": \"16.8.1\"}, {\"status\": \"affected\", \"version\": \"16.8.1a\"}, {\"status\": \"affected\", \"version\": \"16.8.1b\"}, {\"status\": \"affected\", \"version\": \"16.8.1s\"}, {\"status\": \"affected\", \"version\": \"16.8.1c\"}, {\"status\": \"affected\", \"version\": \"16.8.1d\"}, {\"status\": \"affected\", \"version\": \"16.8.2\"}, {\"status\": \"affected\", \"version\": \"16.8.1e\"}, {\"status\": \"affected\", \"version\": \"16.8.3\"}, {\"status\": \"affected\", \"version\": \"16.9.1\"}, {\"status\": \"affected\", \"version\": \"16.9.2\"}, {\"status\": \"affected\", \"version\": \"16.9.1a\"}, {\"status\": \"affected\", \"version\": \"16.9.1b\"}, {\"status\": \"affected\", \"version\": \"16.9.1s\"}, {\"status\": \"affected\", \"version\": \"16.9.3\"}, {\"status\": \"affected\", \"version\": \"16.9.4\"}, {\"status\": \"affected\", \"version\": \"16.9.5\"}, {\"status\": \"affected\", \"version\": \"16.9.5f\"}, {\"status\": \"affected\", \"version\": \"16.9.6\"}, {\"status\": \"affected\", \"version\": \"16.9.7\"}, {\"status\": \"affected\", \"version\": \"16.9.8\"}, {\"status\": \"affected\", \"version\": \"16.10.1\"}, {\"status\": \"affected\", \"version\": \"16.10.1a\"}, {\"status\": \"affected\", \"version\": \"16.10.1b\"}, {\"status\": \"affected\", \"version\": \"16.10.1s\"}, {\"status\": \"affected\", \"version\": \"16.10.1c\"}, {\"status\": \"affected\", \"version\": \"16.10.1e\"}, {\"status\": \"affected\", \"version\": \"16.10.1d\"}, {\"status\": \"affected\", \"version\": \"16.10.2\"}, {\"status\": \"affected\", \"version\": \"16.10.1f\"}, {\"status\": \"affected\", \"version\": \"16.10.1g\"}, {\"status\": \"affected\", \"version\": \"16.10.3\"}, {\"status\": \"affected\", \"version\": \"16.11.1\"}, {\"status\": \"affected\", \"version\": \"16.11.1a\"}, {\"status\": \"affected\", \"version\": \"16.11.1b\"}, {\"status\": \"affected\", \"version\": \"16.11.2\"}, {\"status\": \"affected\", \"version\": \"16.11.1s\"}, {\"status\": \"affected\", \"version\": \"16.12.1\"}, {\"status\": \"affected\", \"version\": \"16.12.1s\"}, {\"status\": \"affected\", \"version\": \"16.12.1a\"}, {\"status\": \"affected\", \"version\": \"16.12.1c\"}, {\"status\": \"affected\", \"version\": \"16.12.1w\"}, {\"status\": \"affected\", \"version\": \"16.12.2\"}, {\"status\": \"affected\", \"version\": \"16.12.1y\"}, {\"status\": \"affected\", \"version\": \"16.12.2a\"}, {\"status\": \"affected\", \"version\": \"16.12.3\"}, {\"status\": \"affected\", \"version\": \"16.12.8\"}, {\"status\": \"affected\", \"version\": \"16.12.2s\"}, {\"status\": \"affected\", \"version\": \"16.12.1x\"}, {\"status\": \"affected\", \"version\": \"16.12.1t\"}, {\"status\": \"affected\", \"version\": \"16.12.4\"}, {\"status\": \"affected\", \"version\": \"16.12.3s\"}, {\"status\": \"affected\", \"version\": \"16.12.3a\"}, {\"status\": \"affected\", \"version\": \"16.12.4a\"}, {\"status\": \"affected\", \"version\": \"16.12.5\"}, {\"status\": \"affected\", \"version\": \"16.12.6\"}, {\"status\": \"affected\", \"version\": \"16.12.1z1\"}, {\"status\": \"affected\", \"version\": \"16.12.5a\"}, {\"status\": \"affected\", \"version\": \"16.12.5b\"}, {\"status\": \"affected\", \"version\": \"16.12.1z2\"}, {\"status\": \"affected\", \"version\": \"16.12.6a\"}, {\"status\": \"affected\", \"version\": \"16.12.7\"}, {\"status\": \"affected\", \"version\": \"16.12.10a\"}, {\"status\": \"affected\", \"version\": \"16.12.11\"}, {\"status\": \"affected\", \"version\": \"17.1.1\"}, {\"status\": \"affected\", \"version\": \"17.1.1a\"}, {\"status\": \"affected\", \"version\": \"17.1.1s\"}, {\"status\": \"affected\", \"version\": \"17.1.1t\"}, {\"status\": \"affected\", \"version\": \"17.1.3\"}, {\"status\": \"affected\", \"version\": \"17.2.1\"}, {\"status\": \"affected\", \"version\": \"17.2.1r\"}, {\"status\": \"affected\", \"version\": \"17.2.1a\"}, {\"status\": \"affected\", \"version\": \"17.2.1v\"}, {\"status\": \"affected\", \"version\": \"17.2.2\"}, {\"status\": \"affected\", \"version\": \"17.2.3\"}, {\"status\": \"affected\", \"version\": \"17.3.1\"}, {\"status\": \"affected\", \"version\": \"17.3.2\"}, {\"status\": \"affected\", \"version\": \"17.3.3\"}, {\"status\": \"affected\", \"version\": \"17.3.1a\"}, {\"status\": \"affected\", \"version\": \"17.3.1w\"}, {\"status\": \"affected\", \"version\": \"17.3.2a\"}, {\"status\": \"affected\", \"version\": \"17.3.1x\"}, {\"status\": \"affected\", \"version\": \"17.3.1z\"}, {\"status\": \"affected\", \"version\": \"17.3.4\"}, {\"status\": \"affected\", \"version\": \"17.3.5\"}, {\"status\": \"affected\", \"version\": \"17.3.4a\"}, {\"status\": \"affected\", \"version\": \"17.3.6\"}, {\"status\": \"affected\", \"version\": \"17.3.4b\"}, {\"status\": \"affected\", \"version\": \"17.3.4c\"}, {\"status\": \"affected\", \"version\": \"17.3.5a\"}, {\"status\": \"affected\", \"version\": \"17.3.5b\"}, {\"status\": \"affected\", \"version\": \"17.3.7\"}, {\"status\": \"affected\", \"version\": \"17.3.8\"}, {\"status\": \"affected\", \"version\": \"17.3.8a\"}, {\"status\": \"affected\", \"version\": \"17.4.1\"}, {\"status\": \"affected\", \"version\": \"17.4.2\"}, {\"status\": \"affected\", \"version\": \"17.4.1a\"}, {\"status\": \"affected\", \"version\": \"17.4.1b\"}, {\"status\": \"affected\", \"version\": \"17.4.2a\"}, {\"status\": \"affected\", \"version\": \"17.5.1\"}, {\"status\": \"affected\", \"version\": \"17.5.1a\"}, {\"status\": \"affected\", \"version\": \"17.6.1\"}, {\"status\": \"affected\", \"version\": \"17.6.2\"}, {\"status\": \"affected\", \"version\": \"17.6.1w\"}, {\"status\": \"affected\", \"version\": \"17.6.1a\"}, {\"status\": \"affected\", \"version\": \"17.6.1x\"}, {\"status\": \"affected\", \"version\": \"17.6.3\"}, {\"status\": \"affected\", \"version\": \"17.6.1y\"}, {\"status\": \"affected\", \"version\": \"17.6.1z\"}, {\"status\": \"affected\", \"version\": \"17.6.3a\"}, {\"status\": \"affected\", \"version\": \"17.6.4\"}, {\"status\": \"affected\", \"version\": \"17.6.1z1\"}, {\"status\": \"affected\", \"version\": \"17.6.5\"}, {\"status\": \"affected\", \"version\": \"17.6.6\"}, {\"status\": \"affected\", \"version\": \"17.6.6a\"}, {\"status\": \"affected\", \"version\": \"17.6.5a\"}, {\"status\": \"affected\", \"version\": \"17.6.7\"}, {\"status\": \"affected\", \"version\": \"17.6.8\"}, {\"status\": \"affected\", \"version\": \"17.6.8a\"}, {\"status\": \"affected\", \"version\": \"17.7.1\"}, {\"status\": \"affected\", \"version\": \"17.7.1a\"}, {\"status\": \"affected\", \"version\": \"17.7.1b\"}, {\"status\": \"affected\", \"version\": \"17.7.2\"}, {\"status\": \"affected\", \"version\": \"17.10.1\"}, {\"status\": \"affected\", \"version\": \"17.10.1a\"}, {\"status\": \"affected\", \"version\": \"17.10.1b\"}, {\"status\": \"affected\", \"version\": \"17.8.1\"}, {\"status\": \"affected\", \"version\": \"17.8.1a\"}, {\"status\": \"affected\", \"version\": \"17.9.1\"}, {\"status\": \"affected\", \"version\": \"17.9.1w\"}, {\"status\": \"affected\", \"version\": \"17.9.2\"}, {\"status\": \"affected\", \"version\": \"17.9.1a\"}, {\"status\": \"affected\", \"version\": \"17.9.1x\"}, {\"status\": \"affected\", \"version\": \"17.9.1y\"}, {\"status\": \"affected\", \"version\": \"17.9.3\"}, {\"status\": \"affected\", \"version\": \"17.9.2a\"}, {\"status\": \"affected\", \"version\": \"17.9.1x1\"}, {\"status\": \"affected\", \"version\": \"17.9.3a\"}, {\"status\": \"affected\", \"version\": \"17.9.4\"}, {\"status\": \"affected\", \"version\": \"17.9.1y1\"}, {\"status\": \"affected\", \"version\": \"17.9.5\"}, {\"status\": \"affected\", \"version\": \"17.9.4a\"}, {\"status\": \"affected\", \"version\": \"17.9.5a\"}, {\"status\": \"affected\", \"version\": \"17.9.5b\"}, {\"status\": \"affected\", \"version\": \"17.9.6\"}, {\"status\": \"affected\", \"version\": \"17.9.6a\"}, {\"status\": \"affected\", \"version\": \"17.9.7\"}, {\"status\": \"affected\", \"version\": \"17.9.5e\"}, {\"status\": \"affected\", \"version\": \"17.9.5f\"}, {\"status\": \"affected\", \"version\": \"17.9.8\"}, {\"status\": \"affected\", \"version\": \"17.9.7a\"}, {\"status\": \"affected\", \"version\": \"17.9.7b\"}, {\"status\": \"affected\", \"version\": \"17.11.1\"}, {\"status\": \"affected\", \"version\": \"17.11.1a\"}, {\"status\": \"affected\", \"version\": \"17.12.1\"}, {\"status\": \"affected\", \"version\": \"17.12.1w\"}, {\"status\": \"affected\", \"version\": \"17.12.1a\"}, {\"status\": \"affected\", \"version\": \"17.12.1x\"}, {\"status\": \"affected\", \"version\": \"17.12.2\"}, {\"status\": \"affected\", \"version\": \"17.12.3\"}, {\"status\": \"affected\", \"version\": \"17.12.2a\"}, {\"status\": \"affected\", \"version\": \"17.12.1y\"}, {\"status\": \"affected\", \"version\": \"17.12.1z\"}, {\"status\": \"affected\", \"version\": \"17.12.4\"}, {\"status\": \"affected\", \"version\": \"17.12.3a\"}, {\"status\": \"affected\", \"version\": \"17.12.1z1\"}, {\"status\": \"affected\", \"version\": \"17.12.1z2\"}, {\"status\": \"affected\", \"version\": \"17.12.4a\"}, {\"status\": \"affected\", \"version\": \"17.12.5\"}, {\"status\": \"affected\", \"version\": \"17.12.4b\"}, {\"status\": \"affected\", \"version\": \"17.12.1z3\"}, {\"status\": \"affected\", \"version\": \"17.12.5a\"}, {\"status\": \"affected\", \"version\": \"17.12.1z4\"}, {\"status\": \"affected\", \"version\": \"17.12.6\"}, {\"status\": \"affected\", \"version\": \"17.12.5b\"}, {\"status\": \"affected\", \"version\": \"17.12.5c\"}, {\"status\": \"affected\", \"version\": \"17.12.6a\"}, {\"status\": \"affected\", \"version\": \"17.12.5d\"}, {\"status\": \"affected\", \"version\": \"17.12.1z5\"}, {\"status\": \"affected\", \"version\": \"17.12.1z6\"}, {\"status\": \"affected\", \"version\": \"17.12.6b\"}, {\"status\": \"affected\", \"version\": \"17.13.1\"}, {\"status\": \"affected\", \"version\": \"17.13.1a\"}, {\"status\": \"affected\", \"version\": \"17.14.1\"}, {\"status\": \"affected\", \"version\": \"17.14.1a\"}, {\"status\": \"affected\", \"version\": \"17.15.1\"}, {\"status\": \"affected\", \"version\": \"17.15.1w\"}, {\"status\": \"affected\", \"version\": \"17.15.1a\"}, {\"status\": \"affected\", \"version\": \"17.15.2\"}, {\"status\": \"affected\", \"version\": \"17.15.1b\"}, {\"status\": \"affected\", \"version\": \"17.15.1x\"}, {\"status\": \"affected\", \"version\": \"17.15.1z\"}, {\"status\": \"affected\", \"version\": \"17.15.3\"}, {\"status\": \"affected\", \"version\": \"17.15.2c\"}, {\"status\": \"affected\", \"version\": \"17.15.2a\"}, {\"status\": \"affected\", \"version\": \"17.15.1y\"}, {\"status\": \"affected\", \"version\": \"17.15.2b\"}, {\"status\": \"affected\", \"version\": \"17.15.3a\"}, {\"status\": \"affected\", \"version\": \"17.15.4\"}, {\"status\": \"affected\", \"version\": \"17.15.3b\"}, {\"status\": \"affected\", \"version\": \"17.15.4d\"}, {\"status\": \"affected\", \"version\": \"17.15.4e\"}, {\"status\": \"affected\", \"version\": \"17.16.1\"}, {\"status\": \"affected\", \"version\": \"17.16.1a\"}, {\"status\": \"affected\", \"version\": \"17.17.1\"}, {\"status\": \"affected\", \"version\": \"17.18.1\"}, {\"status\": \"affected\", \"version\": \"17.18.1w\"}, {\"status\": \"affected\", \"version\": \"17.18.1a\"}, {\"status\": \"affected\", \"version\": \"17.18.1x\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is aware that a public announcement is available for the vulnerability that is described in this advisory.\\r\\n\\r\\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-crlf-NvgKTKJZ\", \"name\": \"cisco-sa-iox-crlf-NvgKTKJZ\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the web-based Cisco IOx application hosting environment management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user.\\r\\n\\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to arbitrarily inject log entries, manipulate the structure of log files, or obscure legitimate log events.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-93\", \"description\": \"Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2026-03-25T16:08:39.046Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-20113\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-27T15:02:21.557Z\", \"dateReserved\": \"2025-10-08T11:59:15.375Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2026-03-25T16:08:39.046Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…