Lucene search

K
ciscoCiscoCISCO-SA-CSSM-AUTH-SLW3UHUY
HistoryJul 17, 2024 - 4:00 p.m.

Cisco Smart Software Manager On-Prem Password Change Vulnerability

2024-07-1716:00:00
tools.cisco.com
21
cisco smart software manager
on-prem
vulnerability
authentication
remote attacker
password change
http requests
software updates

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

22.6%

A vulnerability in the authentication system of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to change the password of any user, including administrative users.

This vulnerability is due to improper implementation of the password-change process. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy”]

Affected configurations

Vulners
Node
ciscosmart_software_manager_on-premMatchany
OR
ciscosmart_software_manager_on-premMatchany
VendorProductVersionCPE
ciscosmart_software_manager_on-premanycpe:2.3:a:cisco:smart_software_manager_on-prem:any:*:*:*:*:*:*:*

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

22.6%

Related for CISCO-SA-CSSM-AUTH-SLW3UHUY