CVE-2024-20439: Cisco Smart Licensing Utility Static Credential Vulnerability

9.8 CVSS

Description

A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to log in to an affected system by using a static administrative credential.

This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to log in to the affected system. A successful exploit could allow the attacker to log in to the affected system with administrative privileges over the API of the Cisco Smart Licensing Utility application.

Known Exploited

🚨 Marked as known exploited on March 21st, 2025 (29 days ago).

Classification

CVE ID: CVE-2024-20439

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem Types

Hidden Functionality

Affected Products

Vendor: Cisco

Product: Cisco Smart License Utility

Nuclei Template

http/cves/2024/CVE-2024-20439.yaml

Exploit Prediction Scoring System (EPSS)

EPSS Score: 89.45% (probability of being exploited)

EPSS Percentile: 99.5% (scored less or equal to compared to others)

EPSS Date: 2025-04-18 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: active

SSVC Technical Impact: total

SSVC Automatable: true

References

https://nvd.nist.gov/vuln/detail/CVE-2024-20439
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw

Timeline