Cyber Security News

Cisco Smart Licensing Utility Flaws Allowed Attackers to Gain Admin Access

Cisco has disclosed critical vulnerabilities in its Smart Licensing Utility software, identified as CVE-2024-20439 and CVE-2024-20440, which could allow unauthenticated, remote attackers to gain administrative access or collect sensitive information from compromised systems.

These flaws, rated with a severity score of 9.8 in the Common Vulnerability Scoring System (CVSS), pose significant security risks to organizations using the affected software.

CVE-2024-20439: Static Credential Vulnerability

A flaw in Cisco Smart Licensing Utility allows unauthorized attackers to log into systems remotely using hardcoded static administrative credentials.

The issue arises due to the presence of an undocumented administrative account. Successful exploitation grants attackers access to administrative privileges over the application’s API, leaving systems vulnerable to further compromise.

  • Bug ID: CSCwi41731
  • CWE: CWE-532
  • Impact: Unauthorized administrative access to affected systems.
  • CVSS Base Score: 9.8

CVE-2024-20440: Information Disclosure Vulnerability

A separate vulnerability stems from excessive verbosity in debug log files.

Attackers could exploit this issue by sending crafted HTTP requests to affected systems, allowing them to access sensitive log files containing credentials and other critical information.

The disclosed data could enable attackers to further compromise the system.

  • Bug ID: CSCwi47950
  • CWE: CWE-912
  • Impact: Exposure of sensitive information such as administrative credentials.
  • CVSS Base Score: 9.8

Affected Products

The vulnerabilities impact the Cisco Smart Licensing Utility software when actively running. Cisco has confirmed the following products are not vulnerable:

  • Smart Software Manager On-Prem
  • Smart Software Manager Satellite
Cisco Smart License Utility ReleaseStatusFirst Fixed Release
2.0.0VulnerableMigrate to a fixed release
2.1.0VulnerableMigrate to a fixed release
2.2.0VulnerableMigrate to a fixed release
2.3.0Not VulnerableAlready fixed

Mitigation Steps

Cisco has released free updates to address these vulnerabilities. Users are urged to migrate to a non-vulnerable software version promptly.

Cisco has provided detailed guidance for obtaining software upgrades via the Cisco Support and Downloads page and other authorized channels.

No workarounds are available for these vulnerabilities. Users must upgrade to secure their systems.

Cisco confirmed reports of attempted exploitation of these vulnerabilities as of March 2025. Organizations are strongly advised to take timely action and implement mitigating software updates to prevent compromise.

Organizations using vulnerable versions of Cisco Smart Licensing Utility must act immediately to prevent unauthorized access and information leaks.

Cisco continues to monitor these vulnerabilities and urges users to stay updated with the latest patches and advisories.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir Kutleshi,…

1 hour ago

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

1 day ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

2 days ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

2 days ago

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM) and…

2 days ago

Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials

A surge in phishing text messages claiming unpaid tolls has been linked to a massive…

2 days ago