Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-20439

Description: Multiple vulnerabilities in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to collect sensitive information or administer Cisco Smart Licensing Utility services on a system while the software is running. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. For more information about these vulnerabilities, see the Details section of this advisory. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw Security Impact Rating: Critical CVE: CVE-2024-20439,CVE-2024-20440

CVSS: CRITICAL (9.8)

EPSS Score: 89.45%

Source: Cisco Security Advisory
April 1st, 2025 (18 days ago)

CVE-2024-20439

🚨 Marked as known exploited on April 10th, 2025 (9 days ago).
Description: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-20439 Cisco Smart Licensing Utility Static Credential Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

CVSS: CRITICAL (9.8)

EPSS Score: 89.45%

Source: All CISA Advisories
March 31st, 2025 (19 days ago)

CVE-2024-20439

Description: Cisco Smart Licensing Utility contains a static credential vulnerability that allows an unauthenticated, remote attacker to log in to an affected system and gain administrative credentials.

CVSS: CRITICAL (9.8)

EPSS Score: 89.45%

Source: CISA KEV
March 31st, 2025 (19 days ago)

CVE-2024-20439

🚨 Marked as known exploited on March 21st, 2025 (29 days ago).
Description: A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to log in to an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to log in to the affected system. A successful exploit could allow the attacker to log in to the affected system with administrative privileges over the API of the Cisco Smart Licensing Utility application.

CVSS: CRITICAL (9.8)

EPSS Score: 89.45%

SSVC Exploitation: active

Source: CVE
March 28th, 2025 (22 days ago)
🚨 Marked as known exploited on April 10th, 2025 (9 days ago).
Description: Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center. The two critical-rated vulnerabilities in question are listed below -  CVE-2024-20439 (CVSS score: 9.8) - The presence of an undocumented static user credential for an administrative account that an attacker could exploit to log in to an

CVSS: CRITICAL (9.8)

EPSS Score: 89.45%

Source: TheHackerNews
March 21st, 2025 (29 days ago)

CVE-2023-20025

Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow a remote attacker to bypass authentication or execute arbitrary commands on the underlying operating system of an affected device. For more information about these vulnerabilities, see the Details section of this advisory.  Cisco has not released software updates to address the vulnerabilities described in this advisory. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 Security Impact Rating: Critical CVE: CVE-2023-20025,CVE-2023-20026,CVE-2023-20118

CVSS: CRITICAL (9.0)

Source: Cisco Security Advisory
March 7th, 2025 (about 1 month ago)

CVE-2024-4577

Description: Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025. "The attacker has exploited the vulnerability CVE-2024-4577, a remote code execution (RCE) flaw in the PHP-CGI implementation of PHP on Windows, to gain initial access to victim machines," Cisco Talos researcher Chetan Raghuprasad said in a technical

CVSS: CRITICAL (9.8)

EPSS Score: 95.38%

Source: TheHackerNews
March 7th, 2025 (about 1 month ago)

CVE-2024-4577

Description: Cisco Talos has discovered an active exploitation of CVE-2024-4577 by an attacker in order to gain access to the victim's machines and carry out post-exploitation activities.

CVSS: CRITICAL (9.8)

EPSS Score: 95.38%

Source: Cisco Talos Blog
March 6th, 2025 (about 1 month ago)

CVE-2018-0171

Description: In addition to using CVE-2018-0171 and other Cisco bugs to break into telecom networks, the China-sponsored APT is also using using stolen login credentials for initial access.

CVSS: CRITICAL (9.8)

Source: Dark Reading
February 21st, 2025 (about 2 months ago)

CVE-2023-20198

Description: A newly uncovered cyber espionage campaign led by the Chinese state-sponsored hacking group Salt Typhoon (Red Mike) has compromised vulnerable Cisco devices worldwide, targeting telecommunications providers across multiple countries, including the United States, the United Kingdom, and South Africa. The attack exploits two critical privilege escalation vulnerabilities, CVE-2023-20198 and CVE-2023-20273, found in Cisco IOS XE … The post Chinese Hackers Breach Cisco Devices in Global Telecom Attacks appeared first on CyberInsider.

CVSS: CRITICAL (10.0)

Source: CyberInsider
February 14th, 2025 (2 months ago)