Cisco Raises Alarm on Critical Vulnerability Impacting On-Prem Smart Software Manager

July 18, 2024Newsroom

Cisco has issued fixes to attend to a critical security vulnerability impacting Smart Software Manager On-Prem (Cisco SSM On-Prem) that has the potential to allow a remote, unauthenticated attacker to modify the password of

Cisco Warns of Critical Flaw Affecting On-Prem Smart Software Manager

July 18, 2024Newsroom

Cisco Warns of Critical Flaw Affecting On-Prem Smart Software Manager

Cisco has issued fixes to attend to a critical security vulnerability impacting Smart Software Manager On-Prem (Cisco SSM On-Prem) that has the potential to allow a remote, unauthenticated attacker to modify the password of any users, including those associated with administrative privileges.

The flaw, identified as CVE-2024-20419, comes with a CVSS rating of 10.0.

“This vulnerability stems from the incorrect implementation of the password-change procedure,” as stated in an advisory by the company. “By sending tailored HTTP requests to a vulnerable device, an attacker could exploit this vulnerability. A successful exploitation could grant an attacker access to the web UI or API using the compromised user’s privileges.”

This weakness impacts Cisco SSM On-Prem versions 8-202206 and earlier. The issue has been resolved in version 8-202212. It’s essential to note that version 9 is immune to this flaw.

Cybersecurity

CISA Introduces 3 Vulnerabilities to KEV Catalog

inclusion of three vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog, following evidence of active exploitation –

  • CVE-2024-34102 (CVSS score: 9.8) – Adobe Commerce and Magento Open Source Incorrect Limitation of XML External Entity Reference (XXE) Vulnerability
  • CVE-2024-28995 (CVSS score: 8.6) – SolarWinds Serv-U Path Traversal Vulnerability
  • CVE-2022-22948 (CVSS score: 6.5) – VMware vCenter Server Inaccurate Default File Permissions Vulnerability
CosmicSting, presents a critical security flaw due to mishandling of nested deserialization, enabling attackers to achieve remote code execution. Assetnote released a proof-of-concept (PoC) exploit for the flaw towards the end of last month.

CVE-2024-28995, a directory traversal vulnerability enabling access to sensitive files on the host machine, were outlined by GreyNoise, including attempted access to files such as /etc/passwd.

attributed by Mandiant, a Google-owned entity, to a Chinese-linked cyber espionage group identified as UNC3886, known for exploiting zero-day vulnerabilities in Fortinet, Ivanti, and VMware appliances.

Found this article intriguing? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.