High-Severity Cisco Bug Grants Attackers Password Access

Share This Post

Cisco has released a patch for a maximum-severity vulnerability, tracked as CVE-2024-20419, that allows threat actors to change any user or admin password.

The vulnerability carries a CVSS rating of 10, however, the company has not released many details about the bug, likely due to how high risk it is.

The attack complexity was deemed low, as no privileges or user interaction is necessary to complete the action, but the impact on the product’s integrity, availability, and confidentiality are all deemed high.

“An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device,” Cisco said in a statement. “A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user.”

This vulnerability affects SSM On-Prem and SSM Satellite. There are no workarounds for the vulnerability, so it’s recommended that users apply patches for the bug as soon as possible. 

Cisco has not released any additional information regarding this vulnerability in the wild or how many users have been potentially impacted. SSM On-Prem is primarily used by “financial institutions, utilities, service providers, and government organizations,” according to the vendor, so organizations in these sectors should be especially wary. 

https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf3dea4efe34ef9c9/654e3a08321529040a095d12/Passwords-1800_designer491_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.