Short Summary
The SonicWall Capture Labs threat research team identified a critical account takeover vulnerability (CVE-2024-20419) in Cisco’s Smart Software Manager (SSM), which allows attackers to reset any user’s password without authentication. This vulnerability has a CVSS score of 10.0 and affects versions 8-202206 and earlier. Cisco recommends upgrading to version 8-202212 to mitigate the risk.
Key Points
- Vulnerability Identified: CVE-2024-20419 in Cisco Smart Software Manager (SSM).
- CVSS Score: 10.0, indicating a critical severity level.
- Impact: Allows attackers to reset any user’s password, including administrators, without authentication.
- Exploitation: Publicly available proof of concept (PoC) code increases the likelihood of exploitation.
- Affected Versions: Cisco SSM On-Prem software version 8-202206 and earlier.
- Mitigation: Upgrade to version 8-202212; no known workarounds available.
- Technical Flaw: Vulnerability exists in the OTP generation process, allowing bypass of security checks.
- SonicWall Protections: New signatures released for IPS to protect against this vulnerability.
- Best Practices: Implement IP whitelisting, network segmentation, and remove internet-facing access to reduce risk.
MITRE ATT&CK TTPs – created by AI
- Account Manipulation (T1098)
- Procedures:
- Exploitation of the vulnerability allows attackers to reset passwords for any user account.
- Procedures:
- Credential Dumping (T1003)
- Procedures:
- Using the authentication token obtained through the vulnerability to gain unauthorized access.
- Procedures:
Overview
The SonicWall Capture Labs threat research team became aware of an account takeover vulnerability in Cisco’s Smart Software Manager (SSM), assessed its impact and developed mitigation measures for the vulnerability. Identified as CVE-2024-20419 and given a perfect CVSS of 10.0, this remote vulnerability allows an attacker to change any user’s account password on the device, including the administrator, without requiring the attacker to be authenticated. While it is uncertain if the exploit is currently being actively exploited, a publicly available proof of concept code (PoC) is available, making exploitation more likely. The vulnerability affects Cisco SSM On-Prem software version 8-202206 and earlier. Cisco advises to upgrade to version 8-202212 with no other known workarounds.
Technical Overview
CVE-2024-20419 is a flaw in the OTP (One-Time Password) generation process within Cisco Smart Software Manager On-Prem. The vulnerability exists in the `/backend/reset_password/generate_code` endpoint. This endpoint is intended to allow a user to verify their identity before obtaining the OTP; however, the application incorrectly includes the OTP in the response before verification is complete. This flaw allows an attacker to use the authorization token before the OTP verification step is completed, bypassing security checks and resetting any user’s passwords, including those of administrators.
Triggering the Vulnerability
Using the publicly available PoC code, we can see that triggering the vulnerability requires two web requests to the SSM – a GET request followed by a POST request. The GET request, as seen in Figure 1, is used to obtain the required tokens, a XSRF and session token, for the next request.
Figure 1: Obtaining required tokens using GET request
With the appropriate tokens obtained, they can be used to trigger the vulnerability by sending a post request to the vulnerable endpoint `/backend/reset_password/generate_code` as seen in Figure 2. The vulnerability SSM will return the authentication token in the response which can be parsed out.
Figure 2: Construction POST request to trigger vulnerability
Exploitation
To exploit the information obtained by the vulnerability, the attacker uses the token to send a request to the ‘backend/reset_password’ endpoint, providing the username and authentication token obtained. This allows the attacker to provide a new password. Figure 3 demonstrates the exploitation of this vulnerability by chaining all 3 requests using the public PoC.
SonicWall Protections
To ensure SonicWall customers are prepared for any exploitation that may occur due to this vulnerability, the following signatures have been released:
- IPS: 20223 Cisco SSM Admin Password Reset
Remediation Recommendations
Per the Cisco advisory, customers should upgrade to Cisco SSM version 8-202212. Cisco has reported no other known workarounds at this time, so an upgrade is required. Additional industry best practices, such as implementing an IP whitelist, network segmentation and removing internet-facing access would help reduce overall risk despite not completely mitigating the issue.
Relevant Links
Source: Original Post