Exploit für Cisco SSM-Bug veröffentlicht, der Änderungen des Admin-Passworts ermöglicht

Teilen:

Cisco warns that exploit code is now available for a maximum severity vulnerability that lets attackers change any user password on unpatched Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers.

As a Cisco Smart Licensing component, Cisco SSM On-Prem helps manage accounts and product licenses on an organization’s environment using a dedicated dashboard on the local network.

“The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability that is described in this advisory,” the company warned on Wednesday.

However, Cisco has yet to find evidence of attackers exploiting this security flaw (tracked as CVE-2024-20419) in the wild.

CVE-2024-20419 is caused by an unverified password change weakness in SSM On-Prem’s authentication system. This weakness lets unauthenticated attackers remotely change any user password (including those used for administrator accounts) without knowing the original credentials.

“This vulnerability is due to improper implementation of the password-change process. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device,” Cisco explained in July when it released security updates to address the flaw.

“A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user.”

No workarounds are available for impacted systems, and all admins must upgrade to a fixed release to secure vulnerable SSM On-Prem servers.

Last month, Cisco also patched a critical vulnerability that allows attackers to add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances using emails with malicious attachments and fixed an NX-OS zero-day (CVE-2024-20399) that had been exploited in the wild since April to install previously unknown malware as root on vulnerable MDS and Nexus switches.

Today, CISA warned admins to disable the legacy Cisco Smart Install feature after seeing it abused in recent attacks to steal sensitive data like system configuration files.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
1:52 pm, Jan. 22, 2025
Wetter-Symbol 4°C
L: 3° | H: 5°
overcast clouds
Luftfeuchtigkeit: 90 %
Druck: 1003 mb
Wind: 6 mph NW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 6 km
Sonnenaufgang: 7:52 am
Sonnenuntergang: 4:31 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
3° | 5°°C 0 mm 0% 3 mph 90 % 1003 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 7°°C 1 mm 100% 16 mph 89 % 1005 mb 0 mm/h
Fr. Jan. 24 9:00 pm
Wetter-Symbol
5° | 11°°C 1 mm 100% 24 mph 89 % 1003 mb 0 mm/h
Sa. Jan. 25 9:00 pm
Wetter-Symbol
3° | 6°°C 1 mm 100% 7 mph 88 % 1012 mb 0 mm/h
So. Jan. 26 9:00 pm
Wetter-Symbol
3° | 7°°C 0.2 mm 20% 15 mph 89 % 1011 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
4° | 5°°C 0 mm 0% 3 mph 90 % 1003 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
3° | 4°°C 0 mm 0% 3 mph 88 % 1003 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 85 % 1003 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
4° | 4°°C 0 mm 0% 4 mph 75 % 1003 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 5 mph 83 % 1005 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 7 mph 86 % 1004 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
5° | 5°°C 0 mm 0% 10 mph 88 % 1003 mb 0 mm/h
Tomorrow 12:00 pm
Wetter-Symbol
7° | 7°°C 1 mm 100% 15 mph 89 % 999 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€99,939.20
-0.26%
Ethereum(ETH)
€3,153.72
-0.30%
XRP(XRP)
€3.05
1.34%
Fesseln(USDT)
€0.96
0.08%
Solana(SOL)
€251.05
8.43%
Dogecoin(DOGE)
€0.346263
-1.86%
USDC(USDC)
€0.96
0.00%
Shiba Inu(SHIB)
€0.000019
-1.03%
Pepe(PEPE)
€0.000015
1.65%
Peanut das Eichhörnchen(PNUT)
€0.350537
-0.43%
Nach oben scrollen