Critical Cisco Vulnerability Allows Password Alterations

July 18, 2024

Cisco has issued a fix for a high-risk vulnerability, designated as CVE-2024-20419, that allows threat actors to modify any user or admin password. The flaw has been given the highest possible Common Vulnerability Scoring System (CVSS) score of 10, though the company has refrained from releasing extensive details about the bug due to its severity.

The complexity of the attack has been classified as low, meaning no privileges or user interaction are required to execute the action. However, the bug's impact on the product's integrity, availability, and confidentiality has been rated as high. According to a statement by Cisco, "An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user."

The vulnerability affects SSM On-Prem and SSM Satellite. There are no known workarounds for the vulnerability, making it crucial for users to apply patches for the bug as soon as they become available. Cisco has not disclosed any further information regarding the prevalence of this vulnerability in the wild or the number of users potentially affected.

SSM On-Prem is primarily used by entities such as financial institutions, utilities, service providers, and government organizations, as stated by the vendor. Therefore, organizations within these sectors should be particularly vigilant.

Related News

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.