Cisco Software Manager Password Change Vulnerability Let Hackers Change password

by Esmeralda McKenzie
Cisco Software Manager Password Change Vulnerability Let Hackers Change password

Cisco Software Manager Password Change Vulnerability Let Hackers Change password

Cisco Tool Supervisor Password Change Vulnerability Let Hackers Change password

A predominant vulnerability in Cisco’s Trim Tool Supervisor On-Prem (SSM On-Prem) has surfaced, allowing unauthenticated, remote attackers to interchange user passwords, including these of administrative customers.

This flaw, rooted in improperly implementing the password-substitute course of, has raised critical security concerns among Cisco customers and IT mavens worldwide.

CVE-2024-20419 – Vulnerability Crucial aspects

The vulnerability enables attackers to employ the blueprint by sending crafted HTTP requests to an affected blueprint. If winning, this exploit grants the attacker in finding admission to to the acquire UI or API with the equivalent privileges because the compromised user.

Google Data

This is able to perhaps potentially consequence in unauthorized in finding admission to to delicate knowledge and blueprint functionalities. Affected merchandise consist of Cisco SSM On-Prem and Cisco Trim Tool Supervisor Satellite (SSM Satellite).

It’s crucial to repeat that these are truly the equivalent product, with the title substitute taking place as of Originate 7.0. Cisco Trim Licensing Utility, on the alternative hand, remains unaffected by this vulnerability.

Cisco’s Response and Solutions

Cisco has replied promptly by releasing blueprint updates to take care of this vulnerability. Sadly, no workarounds come in, so customers fill to fill a examine the updates as rapidly as imaginable.

The advisory on this web 22 situation can also very neatly be stumbled on on Cisco’s loyal security advisory online page. For these with provider contracts, Cisco advises obtaining security fixes via standard substitute channels.

Customers must be definite their devices fill enough memory and that their most modern configurations will strengthen the fresh birth. In cases of uncertainty, it is suggested that potentialities contact the Cisco Technical Support Center (TAC).

Affected and Fastened Releases

Cisco SSM On-Prem Originate First Fastened Originate
8-202206 and earlier 8-202212
9 Now not vulnerable

Customers with out provider contracts or these that purchased via third-celebration vendors are urged to contact the Cisco TAC to develop main upgrades. To facilitate the course of, it’s foremost to fill the product serial quantity and the advisory URL bright.

Cisco emphasizes that these free security updates enact now not grant fresh blueprint licenses or extra aspects but address the existing vulnerability. Customers are encouraged to search the advice of Cisco’s security advisories on an ordinary foundation to end suggested about skill exposures and solutions.

Source credit : cybersecuritynews.com

Related Posts