Security

Patches

Maximum-severity Cisco vulnerability allows attackers to change admin passwords

You’re going to want to patch this one


Cisco just dropped a patch for a maximum-severity vulnerability that allows attackers to change the password of any user, including admins.

Tracked as CVE-2024-20419, the bug carries a maximum 10/10 CVSS 3.1 rating and affects the authentication system of Cisco Smart Software Manager (SSM) On-Prem.

Cisco hasn't disclosed too many details about this, which is more than understandable given the nature of the vulnerability. However we know that an unauthenticated remote attacker can exploit this to change passwords. It's hardly ideal, and should be patched as soon as possible.

Digging into the severity assessment, the attack complexity was deemed "low": no privileges or user interaction would be required to pull it off, and the impact on the product's integrity, availability, and confidentiality is all designated "high." 

"This vulnerability is due to improper implementation of the password-change process," Cisco's advisory reads, providing the last few details about the vulnerability. 

"An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user."

There are no workarounds for this vulnerability, so get those patches applied if you're in the business of keeping your passwords safe and secure. Fortunately, there are no signs of this being exploited in the wild yet, but now the cat's out of the bag it likely won't be long before that changes.

CVE-2024-20419 affects both SSM On-Prem and SSM Satellite. They're different names for the same product, only the latter refers to versions before release 7.0.

For versions 8-202206 and earlier, organizations should upgrade to 8-202212, or better still, version 9 which is unaffected by the vulnerability.

Cisco hasn't mentioned anything about how many of its customers are potentially affected by this flaw, although a recently updated whitepaper [PDF] about SSM On-Prem authored by Cisco says the product "is most often the go-to solution used by financial institutions, utilities, service providers, and government organizations."

Despite being a product targeted at all customers, the industries in which it's most commonly used suggests successful attacks could lead to some pretty nasty outcomes that affect supply chains.

The vulnerability is the standout bug among a slew of issues fixed by Cisco on Wednesday. It was one of two critical flaws addressed with security updates alongside CVE-2024-20401 (9.8), an issue with Cisco Secure Email Gateway that allows an unauthenticated attacker to overwrite arbitrary files on the underlying operating system.

Also addressed in an advisory was the Blast RADIUS vulnerability disclosed earlier this month by security experts across the private sector and academia.

While Cisco hasn't released any patches for this yet, the advisory lists all the products that are confirmed to be affected and not affected by Blast RADIUS, as well as a sprawling list of products still under investigation. 

The vendor pointed to known mitigations for the vuln, but reminded customers that applying them may degrade performance. The advisory will be updated as Cisco's investigation continues.  ®

Send us news
17 Comments

Microsoft fixes under-attack privilege-escalation holes in Hyper-V

Plus: Excel hell, angst for Adobe fans, and life's too Snort for Cisco

Nominet probes network intrusion linked to Ivanti zero-day exploit

Unauthorized activity detected, but no backdoors found

Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug

This is what happens when you publish PoCs immediately, hm?

Zero-day exploits plague Ivanti Connect Secure appliances for second year running

Factory resets and apply patches is the advice amid fortnight delay for other appliances

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

MediaTek rings in the new year with a parade of chipset vulns

Manufacturers should have had ample time to apply the fixes

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more

Six vulnerabilities in ubiquitous rsync tool announced and fixed in a day

Turns out tool does both file transfers and security fixes fast