Security

Cisco's Smart Licensing Utility flaws suggest it's pretty dumb on security

Two critical holes including hardcoded admin credential


If you're running Cisco's supposedly Smart Licensing Utility, there are two flaws you ought to patch right now.

"Multiple vulnerabilities in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to collect sensitive information or administer Cisco Smart Licensing Utility services on a system while the software is running," the networking giant warned about two critical issues.

"Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities."

The two independent flaws could allow a remote attacker to sign themselves in with admin privileges and subvert the whole system. That's bad if untrusted people or rogue users can reach the licensing service. If you have other defenses in front of the Cisco software, that'll mitigate the risk.

The vulnerabilities are:

Both flaws have a CVSS rating of 9.8 out of 10 in severity and have no workaround. That said, a Cisco spokesperson told The Register today: "These vulnerabilities are not exploitable unless the Cisco Smart Licensing Utility was started by a user and is actively running."

The vendor's Product Security Incident Response Team (PSIRT) "is not aware of any malicious use of these vulnerabilities, and fixed software is available," the spokesperson added.

The issues were found internally by network security engineer Eric Vance, so hopefully, online crims haven't got around to exploiting them. But now that they are public, scumbags will pile in if they can find a vulnerable instance to attack, so patch now.

Also, as always, check your support license. "Customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner," it warns as a matter of course.

"In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades." ®

Send us news
9 Comments

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

US reportedly mulls TP-Link router ban over national security risk

It could end up like Huawei -Trump's gonna get ya, get ya, get ya

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

BlackBerry offloads Cylance's endpoint security products to Arctic Wolf

Fresh attempt to mix the perfect cocktail of IoT and Infosec

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Australia moves to drop some cryptography by 2030 – before quantum carves it up

The likes of SHA-256, RSA, ECDSA and ECDH won't be welcome in just five years

Blocking Chinese spies from intercepting calls? There ought to be a law

Sen. Wyden blasts FCC's 'failure' amid Salt Typhoon hacks

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Boffins trick AI model into giving up its secrets

All it took to make an Google Edge TPU give up model hyperparameters was specific hardware, a novel attack technique … and several days

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting