Immediate Patch Required for CVE-2024-20439 and CVE-2024-20440

Published:

Urgent Security Alert: Critical Vulnerabilities in Cisco Smart Licensing Utility Require Immediate Action

Critical Security Alert: Update Required for Cisco’s Smart Licensing Utility

The SANS Technology Institute has issued an urgent warning to organizations using Cisco’s Smart Licensing Utility (CSLU) following the discovery of two severe vulnerabilities. These flaws, first revealed by Cisco in September 2024, could enable attackers to gain unauthorized access to sensitive information or even take full control of affected systems.

CVE-2024-20439, known as the Static Credential Vulnerability, allows attackers to exploit undocumented static user credentials, granting them administrative access to systems that run affected versions of CSLU. This vulnerability is particularly alarming as it can be exploited remotely, even by unauthenticated users, providing attackers seamless entry via the application’s API.

The second vulnerability, CVE-2024-20440, is an Information Disclosure Vulnerability stemming from excessive detail in debug logs, potentially exposing sensitive information, including credentials for the CSLU API. Cisco has rated both vulnerabilities as critical, assigning a base score of 9.8 on the Common Vulnerability Scoring System (CVSS), indicating a high severity.

Reports suggest that exploit attempts are already underway, with Johannes Ullrich, Dean of Research at SANS, emphasizing that attackers are working to leverage the disclosed backdoor credentials. The vulnerabilities were exacerbated by Cisco’s advisory, which inadvertently shared details that facilitate exploitation.

In response, Cisco has confirmed that no workarounds exist for these critical vulnerabilities. Organizations are urged to immediately patch their systems to versions 2.0.0, 2.1.0, 2.2.0, or upgrade to version 2.3.0 or later, which are not affected. This situation underscores the necessity of prompt software updates to avert exploitation and secure sensitive systems. For more details, affected organizations should refer to Cisco’s advisory page or contact their support team directly.

Related articles

Recent articles