A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential.

This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Wed, 11 Jun 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-03-31'}


Wed, 02 Apr 2025 07:15:00 +0900

Type Values Removed Values Added
Title Cisco Smart Licensing Utility Static Credential Vulnerability

Wed, 02 Apr 2025 06:45:00 +0900

Type Values Removed Values Added
Description A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to log in to an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to log in to the affected system. A successful exploit could allow the attacker to log in to the affected system with administrative privileges over the API of the Cisco Smart Licensing Utility application. A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.

Tue, 01 Apr 2025 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 14 Sep 2024 05:00:00 +0900

Type Values Removed Values Added
First Time appeared Cisco smart License Utility
Weaknesses CWE-798
CPEs cpe:2.3:a:cisco:smart_license_utility:*:*:*:*:*:*:*:*
Vendors & Products Cisco smart License Utility

Thu, 05 Sep 2024 03:30:00 +0900

Type Values Removed Values Added
First Time appeared Cisco
Cisco cisco Smart License Utility
CPEs cpe:2.3:a:cisco:cisco_smart_license_utility:*:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco cisco Smart License Utility
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Sep 2024 01:45:00 +0900

Type Values Removed Values Added
Description A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to log in to an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to log in to the affected system. A successful exploit could allow the attacker to log in to the affected system with administrative privileges over the API of the Cisco Smart Licensing Utility application.
Title Cisco Smart Licensing Utility Static Credential Vulnerability
Weaknesses CWE-912
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2025-10-21T22:55:46.010Z

Reserved: 2023-11-08T15:08:07.670Z

Link: CVE-2024-20439

cve-icon Vulnrichment

Updated: 2024-09-04T17:45:35.659Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-04T17:15:13.210

Modified: 2025-10-28T13:59:14.240

Link: CVE-2024-20439

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses