Security

Patches

Maximum-severity Cisco vulnerability allows attackers to change admin passwords

You’re going to want to patch this one


Cisco just dropped a patch for a maximum-severity vulnerability that allows attackers to change the password of any user, including admins.

Tracked as CVE-2024-20419, the bug carries a maximum 10/10 CVSS 3.1 rating and affects the authentication system of Cisco Smart Software Manager (SSM) On-Prem.

Cisco hasn't disclosed too many details about this, which is more than understandable given the nature of the vulnerability. However we know that an unauthenticated remote attacker can exploit this to change passwords. It's hardly ideal, and should be patched as soon as possible.

Digging into the severity assessment, the attack complexity was deemed "low": no privileges or user interaction would be required to pull it off, and the impact on the product's integrity, availability, and confidentiality is all designated "high." 

"This vulnerability is due to improper implementation of the password-change process," Cisco's advisory reads, providing the last few details about the vulnerability. 

"An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user."

There are no workarounds for this vulnerability, so get those patches applied if you're in the business of keeping your passwords safe and secure. Fortunately, there are no signs of this being exploited in the wild yet, but now the cat's out of the bag it likely won't be long before that changes.

CVE-2024-20419 affects both SSM On-Prem and SSM Satellite. They're different names for the same product, only the latter refers to versions before release 7.0.

For versions 8-202206 and earlier, organizations should upgrade to 8-202212, or better still, version 9 which is unaffected by the vulnerability.

Cisco hasn't mentioned anything about how many of its customers are potentially affected by this flaw, although a recently updated whitepaper [PDF] about SSM On-Prem authored by Cisco says the product "is most often the go-to solution used by financial institutions, utilities, service providers, and government organizations."

Despite being a product targeted at all customers, the industries in which it's most commonly used suggests successful attacks could lead to some pretty nasty outcomes that affect supply chains.

The vulnerability is the standout bug among a slew of issues fixed by Cisco on Wednesday. It was one of two critical flaws addressed with security updates alongside CVE-2024-20401 (9.8), an issue with Cisco Secure Email Gateway that allows an unauthenticated attacker to overwrite arbitrary files on the underlying operating system.

Also addressed in an advisory was the Blast RADIUS vulnerability disclosed earlier this month by security experts across the private sector and academia.

While Cisco hasn't released any patches for this yet, the advisory lists all the products that are confirmed to be affected and not affected by Blast RADIUS, as well as a sprawling list of products still under investigation. 

The vendor pointed to known mitigations for the vuln, but reminded customers that applying them may degrade performance. The advisory will be updated as Cisco's investigation continues.  ®

Send us news
17 Comments

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

FreSSH bugs undiscovered for years threaten OpenSSH security

Exploit code now available for MitM and DoS attacks

Critical PostgreSQL bug tied to zero-day attack on US Treasury

High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

Palo Alto firewalls under attack as miscreants chain flaws for root access

If you want to avoid urgent patches, stop exposing management consoles to the public internet

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

Harassment allegations against DEF CON veteran detailed in court filing

More than a dozen women came forward with accusations

Oops, some of our customers' Power Pages-hosted sites were exploited, says Microsoft

Don't think this is SaaS and you can relax: Redmond wants a few of you to check your websites

Twin Google flaws allowed researcher to get from YouTube ID to Gmail address in a few easy steps

PLUS: DOGE web design disappoints; FBI stops crypto scams; Zacks attacked again; and more!