A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
Published 2024-09-04 16:28:40
Updated 2025-04-03 20:58:41
View at NVD,   CVE.org

Products affected by CVE-2024-20439

CVE-2024-20439 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Cisco Smart Licensing Utility Static Credential Vulnerability
CISA required action:
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA description:
Cisco Smart Licensing Utility contains a static credential vulnerability that allows an unauthenticated, remote attacker to log in to an affected system and gain administrative credentials.
Notes:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw ; https://nvd.nist.gov/vuln/detail/CVE-2024-20439
Added on 2025-03-31 Action due date 2025-04-21

Exploit prediction scoring system (EPSS) score for CVE-2024-20439

88.88%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2024-20439

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
N/A
N/A
Cisco:cisco-sa-cslu-7gHMzWmw 2024-09-04
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST 2024-09-13
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
Cisco Systems, Inc. 2025-04-01
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
Cisco Systems, Inc. 2024-09-04

CWE ids for CVE-2024-20439

  • The product contains hard-coded credentials, such as a password or cryptographic key.
    Assigned by: nvd@nist.gov (Primary)
  • The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators.
    Assigned by:
    • d1c1063e-7a18-46af-9102-31f8928bc633 (Primary)
    • psirt@cisco.com (Secondary)
    • ykramarz@cisco.com (Secondary)

References for CVE-2024-20439

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!