Security

Patches

Maximum-severity Cisco vulnerability allows attackers to change admin passwords

You’re going to want to patch this one


Cisco just dropped a patch for a maximum-severity vulnerability that allows attackers to change the password of any user, including admins.

Tracked as CVE-2024-20419, the bug carries a maximum 10/10 CVSS 3.1 rating and affects the authentication system of Cisco Smart Software Manager (SSM) On-Prem.

Cisco hasn't disclosed too many details about this, which is more than understandable given the nature of the vulnerability. However we know that an unauthenticated remote attacker can exploit this to change passwords. It's hardly ideal, and should be patched as soon as possible.

Digging into the severity assessment, the attack complexity was deemed "low": no privileges or user interaction would be required to pull it off, and the impact on the product's integrity, availability, and confidentiality is all designated "high." 

"This vulnerability is due to improper implementation of the password-change process," Cisco's advisory reads, providing the last few details about the vulnerability. 

"An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user."

There are no workarounds for this vulnerability, so get those patches applied if you're in the business of keeping your passwords safe and secure. Fortunately, there are no signs of this being exploited in the wild yet, but now the cat's out of the bag it likely won't be long before that changes.

CVE-2024-20419 affects both SSM On-Prem and SSM Satellite. They're different names for the same product, only the latter refers to versions before release 7.0.

For versions 8-202206 and earlier, organizations should upgrade to 8-202212, or better still, version 9 which is unaffected by the vulnerability.

Cisco hasn't mentioned anything about how many of its customers are potentially affected by this flaw, although a recently updated whitepaper [PDF] about SSM On-Prem authored by Cisco says the product "is most often the go-to solution used by financial institutions, utilities, service providers, and government organizations."

Despite being a product targeted at all customers, the industries in which it's most commonly used suggests successful attacks could lead to some pretty nasty outcomes that affect supply chains.

The vulnerability is the standout bug among a slew of issues fixed by Cisco on Wednesday. It was one of two critical flaws addressed with security updates alongside CVE-2024-20401 (9.8), an issue with Cisco Secure Email Gateway that allows an unauthenticated attacker to overwrite arbitrary files on the underlying operating system.

Also addressed in an advisory was the Blast RADIUS vulnerability disclosed earlier this month by security experts across the private sector and academia.

While Cisco hasn't released any patches for this yet, the advisory lists all the products that are confirmed to be affected and not affected by Blast RADIUS, as well as a sprawling list of products still under investigation. 

The vendor pointed to known mitigations for the vuln, but reminded customers that applying them may degrade performance. The advisory will be updated as Cisco's investigation continues.  ®

Send us news
17 Comments

Cisco's Smart Licensing Utility flaws suggest it's pretty dumb on security

Two critical holes including hardcoded admin credential

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

White House’s new fix for cyber job gaps: Serve the nation in infosec

Now do your patriotic duty and fill one of those 500k open roles, please?

Cisco plans to slash thousands more jobs amid AI, cybersecurity push

Cuts reportedly to come as soon as Wednesday's earnings release

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

Homeland security hopes to scuttle maritime cyber-threats with port infosec testbed

Supply chains, 13M jobs and $649B a year at risk, so Uncle Sam is fighting back - with a request for info

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

SolarWinds left critical hardcoded credentials in its Web Help Desk product

Why go to the effort of backdooring code when devs will basically do it for you accidentally anyway