SME Actions and Indicators of Compromise
Cisco’s CVE advisory recommended disabling both the HTTP and HTTPS servers. Respectively, you’d use the “no ip http server” and “no ip http secure-server” commands. If your devices do have HTTP and HTTPS servers enabled, these log messages are some of the most reliable indicators of a compromised system.
%SYS-5-CONFIG_P: Configured programmatically by process SEP_webui_wsma_http from console as user on line
%SEC_LOGIN-5-WEBLOGIN_SUCCESS: Login Success [user: user] [Source: source_IP_address] at 03:42:13 UTC Wed Oct 11 2023
%WEBUI-6-INSTALL_OPERATION_INFO: User: username, Install Operation: ADD filename

Assessing for Network Vulnerabilities at Scale
Given the set of indicators provided by Cisco, NetBrain’s no-code interface lets us create automation mimicking what an SME would do, but at scale. For these vulnerabilities, we built a pair of Network-Intent-based assessments:
- Identify the Cisco IOS XE devices on their network, along with their web configuration (enabled or not)
- Identify the web-enabled IOS XE devices that were already compromised.
Our interactive network automation Intents promptly empowered clients to detect and mitigate vulnerabilities.
Why Not Make These Kinds of Assessments Continuous?
If you look beyond this CVE problem at the bigger opportunity, you’ll find many aspects need constant assessment, including:
- Operating conditions
- Firmware versions
- Traffic flows
- Access controls
- Failover capabilities
Other aspects include known root causes of common service desk tickets, security policies, and access control architecture.
Make continuous network assessment easy. Use NetBrain Next-Gen and its Network Intent and Preventive Automation technologies. The platform can automatically and continuously test for any condition or operating parameter — at scale!
NetBrain recommends continuously scheduling Intents like the ones designed for this CVE. This approach helps prevent these vulnerabilities from reappearing in the future. Next-Gen’s core capabilities in our Preventive Automation module include continuous network assessment. With our no-code network automation and automated vulnerability assessment, you can continuously validate a broad set of operating conditions. Make automated, continuous network assessment the cornerstone of your service delivery and outage prevention strategy.
The Only No-Code Platform for Hybrid Network Operations
No-code network automation scales your NetOps capacity in minutes, not months. As operational threats continue to evolve, maintaining a proactive approach to network vulnerability management is crucial. Responding to countless service incident reports daily is ineffective and costly.
We designed NetBrain Next-Gen with that singular goal in mind. Leverage your network experts’ knowledge to effectively scale their experience through no-code.
Our four-layer Digital Twin becomes the foundation for no-code automation. It provides real-time details about:
- Device
- Traffic
- Topology
- Desired behaviors
Although the Cisco bug example is extreme, you can repeat the same simple no-code approach for any operating condition. No-code automation is ideal if you need to verify or maintain an operating condition. The steps to create an automation from scratch, without any software developers or programming, are:
- Capture the SME’s Network Intent “Seed Logic”
- Replicate that Intent for every like device across the entire network
- Execute on-demand, schedule to run continuously, or when triggered by an event or third party
Network operations are an ongoing process, and no-code network automation should be the foundation for that process. Your real-time business can’t devote time and resources to addressing latent, hidden issues. Your network engineers must act and play to their strengths as soon as new threats emerge. In doing so, protect your business, network, and reputation from potential harm.