Логотип exploitDog
bind:CVE-2024-20439
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20439

Количество 3

Количество 3

nvd логотип

CVE-2024-20439

больше 1 года назад

A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-mcxm-8hr3-frmx

больше 1 года назад

A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to log in to an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to log in to the affected system. A successful exploit could allow the attacker to log in to the affected system with administrative privileges over the API of the Cisco Smart Licensing Utility application.

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2024-06721

больше 1 года назад

Уязвимость программного обеспечения управления лицензиями Cisco Smart License Utility, связанная с недокументированными статическими учетными данными, позволяющая нарушителю получить несанкционированный доступ к конфиденциальной информации и получить несанкционированный доступ к API

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20439

A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.

CVSS3: 9.8
86%
Высокий
больше 1 года назад
github логотип
GHSA-mcxm-8hr3-frmx

A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to log in to an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to log in to the affected system. A successful exploit could allow the attacker to log in to the affected system with administrative privileges over the API of the Cisco Smart Licensing Utility application.

CVSS3: 9.8
86%
Высокий
больше 1 года назад
fstec логотип
BDU:2024-06721

Уязвимость программного обеспечения управления лицензиями Cisco Smart License Utility, связанная с недокументированными статическими учетными данными, позволяющая нарушителю получить несанкционированный доступ к конфиденциальной информации и получить несанкционированный доступ к API

CVSS3: 9.8
86%
Высокий
больше 1 года назад

Уязвимостей на страницу