First published: Wed Sep 04 2024(Updated: )
A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Smart Licensing Utility | >=2.0.0<2.3.0 | |
Cisco Smart Licensing Utility | ||
>=2.0.0<2.3.0 |
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-20439 is classified as high due to the potential for unauthorized access to systems.
To fix CVE-2024-20439, update Cisco Smart Licensing Utility to the latest version that addresses the static credential issue.
CVE-2024-20439 affects Cisco Smart Licensing Utility versions between 2.0.0 and 2.3.0.
Yes, CVE-2024-20439 can be exploited remotely by an unauthenticated attacker.
CVE-2024-20439 is caused by the presence of an undocumented static user credential for an administrative account.