
"we know that an unauthenticated remote attacker can exploit this to change passwords"
Thank God they got rid of the real threat that was Huawei . . .
Cisco just dropped a patch for a maximum-severity vulnerability that allows attackers to change the password of any user, including admins. Tracked as CVE-2024-20419, the bug carries a maximum 10/10 CVSS 3.1 rating and affects the authentication system of Cisco Smart Software Manager (SSM) On-Prem. Cisco hasn't disclosed too …
Me: ClippyAI, what is Cisco Smart Software Manager (CSSM) ?
ClippyAI: Cisco Smart Software Manager (CSSM) is a web-based portal .. is a web-based application accessible via a browser. It leverages HTML, CSS, and JavaScript .. CSSM provides secure APIs, authentication tokens or API keys ...
This is not the type of attack spooks would want, because it lets the target know they have been compromised because their passwords are changed. They would want silent unlogged access. The attack complexity being "low" is also not what they want, they would want something no one could ever stumble upon by accident.
Both patched vulnerabilities(*) gave you root access, and at that point, all bets are off. These bugs are about as big as they come - frankly, I'm surprised the bulletins didn't come with a warning that exploits have been seen in the wild. However, given who their friends are I suppose that such must have been kept vewwy, vewwy quiet..
I'd say their security is Microsoft compatible.
* There's also a biggie (CVSS score of 9.8) in their now rather ironically named "Security" Email Gateway that allows miscreants to replaces files by simply sending an email with a malicious attachment, so if you see weird file attachments in your spam folder you now know why.
Some have more than one user on their devices or is this just adding a new one?
Anyway, if you have a high level of paranoia, you would be logging changes it to a syslog server that will sent you an alert when something like this changes.
Or if you don't want to stand it up on-prem you can suck up the Cisco-cloudy SSM and have someone hack your routers without you or Cisco ever knowing. No, wait, they just fixed the vuln. But what brought it to their attention in the first place? I mean, whoever trails through their logs looking for compromises?