A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to access sensitive information.
This vulnerability is due to excessive verbosity in a debug log file. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain log files that contain sensitive data, including credentials that can be used to access the API.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Sep 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco smart License Utility
|
|
CPEs | cpe:2.3:a:cisco:smart_license_utility:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_license_utility:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_license_utility:2.2.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco smart License Utility
|
Wed, 04 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco cisco Smart License Utility |
|
CPEs | cpe:2.3:a:cisco:cisco_smart_license_utility:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco
Cisco cisco Smart License Utility |
|
Metrics |
ssvc
|
Wed, 04 Sep 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to access sensitive information. This vulnerability is due to excessive verbosity in a debug log file. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain log files that contain sensitive data, including credentials that can be used to access the API. | |
Title | Cisco Smart Licensing Utility Information Disclosure Vulnerability | |
Weaknesses | CWE-532 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-09-06T03:55:17.035Z
Reserved: 2023-11-08T15:08:07.676Z
Link: CVE-2024-20440

Updated: 2024-09-04T17:43:29.082Z

Status : Analyzed
Published: 2024-09-04T17:15:13.517
Modified: 2024-09-19T13:42:41.017
Link: CVE-2024-20440

No data.