Sunday, April 27, 2025
HomeCVE/vulnerabilityCisco Smart Licensing Utility Vulnerability Let Attackers Gain Admin Control

Cisco Smart Licensing Utility Vulnerability Let Attackers Gain Admin Control

Published on

SIEM as a Service

Follow Us on Google News

Cisco has issued a security advisory (Advisory ID: cisco-sa-cslu-7gHMzWmw) regarding critical vulnerabilities in the Cisco Smart Licensing Utility.

These vulnerabilities could allow unauthenticated, remote attackers to gain administrative control over affected systems.

The advisory was first published on September 4, 2024, and highlights the severity of the issue with a CVSS score of 9.8.

- Advertisement - Google News

Cisco has released software updates to address these vulnerabilities, but no workarounds are available.

Vulnerability Details

CVE-2024-20439: Static Credential Vulnerability

A critical vulnerability identified as CVE-2024-20439 exists in the Cisco Smart Licensing Utility.

This flaw is due to an administrative account’s undocumented, static user credential.

An attacker could exploit this vulnerability by using the static credentials to log in to the affected system, potentially gaining administrative privileges over the API of the Cisco Smart Licensing Utility application.

  • Bug ID: CSCwi41731
  • Security Impact Rating (SIR): Critical
  • CVSS Base Score: 9.8
  • CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2024-20440: Information Disclosure Vulnerability

Another critical vulnerability, CVE-2024-20440, could allow attackers to access sensitive information. This vulnerability arises from excessive verbosity in a debug log file.

By sending a crafted HTTP request to an affected device, an attacker could obtain log files containing sensitive data, including credentials to access the API.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

  • Bug ID: CSCwi47950
  • Security Impact Rating (SIR): Critical
  • CVSS Base Score: 9.8
  • CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products

The vulnerabilities affect systems running a vulnerable release of Cisco Smart Licensing Utility. Notably, these vulnerabilities are not exploitable unless the utility is actively running.

Cisco has confirmed that the following products are not affected:

  • Smart Software Manager On-Prem
  • Smart Software Manager Satellite

Fixed Software

Cisco has released free software updates to address these vulnerabilities. Customers are encouraged to upgrade to the appropriate fixed software release.

The table below outlines the affected and fixed releases:

Cisco Smart License Utility ReleaseFirst Fixed Release
2.0.0Migrate to a fixed release.
2.1.0Migrate to a fixed release.
2.2.0Migrate to a fixed release.
2.3.0Not vulnerable.

As of the advisory’s publication, the Cisco Product Security Incident Response Team (PSIRT) is unaware of any public announcements or malicious use of these vulnerabilities.

Cisco’s advisory underscores the critical nature of the vulnerabilities in the Smart Licensing Utility.

Organizations using affected versions should prioritize updating their systems to mitigate potential risks.

Customers can contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers for further assistance.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...