HomeVulnerabilityCisco Fixes Two Essential Flaws in Sensible Licensing Utility to Stop Distant...

Cisco Fixes Two Essential Flaws in Sensible Licensing Utility to Stop Distant Attacks

Cisco has launched security updates for 2 important security flaws impacting its Sensible Licensing Utility that would permit unauthenticated, distant attackers to raise their privileges or entry delicate info.

A quick description of the 2 vulnerabilities is under –

  • CVE-2024-20439 (CVSS rating: 9.8) – The presence of an undocumented static person credential for an administrative account that an attacker may exploit to log in to an affected system
  • CVE-2024-20440 (CVSS rating: 9.8) – A vulnerability arising attributable to an excessively verbose debug log file that an attacker may exploit to entry such recordsdata by the use of a crafted HTTP request and procure credentials that can be utilized to entry the API

Whereas these shortcomings aren’t depending on one another for them to achieve success, Cisco notes in its advisory that they “aren’t exploitable except Cisco Sensible Licensing Utility was began by a person and is actively operating.”

Cybersecurity

The issues, which had been found throughout inside security testing, additionally don’t have an effect on Sensible Software program Supervisor On-Prem and Sensible Software program Supervisor Satellite tv for pc merchandise.

See also  SASE-based XDR from Cato Networks

Customers of Cisco Sensible License Utility variations 2.0.0, 2.1.0, and a couple of.2.0 are suggested to replace to a set launch. Model 2.3.0 of the software program isn’t inclined to the bug.

Cisco has additionally launched updates to resolve a command injection vulnerability in its Identification Providers Engine (ISE) that would allow an authenticated, native attacker to run arbitrary instructions on an underlying working system and elevate privileges to root.

The flaw, tracked as CVE-2024-20469 (CVSS rating: 6.0), requires an attacker to have legitimate administrator privileges on an affected machine.

“This vulnerability is because of inadequate validation of user-supplied enter,” the corporate stated. “An attacker may exploit this vulnerability by submitting a crafted CLI command. A profitable exploit may permit the attacker to raise privileges to root.”

It impacts the next variations –

  • Cisco ISE 3.2 (3.2P7 – Sep 2024)
  • Cisco ISE 3.3 (3.3P4 – Oct 2024)

The corporate has additionally warned {that a} proof-of-concept (PoC) exploit code is offered, though it isn’t conscious of any malicious exploitation of the bug.

See also  Hackers goal WordPress database plugin lively on 1 million websites

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular