cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-20939,https://securityvulnerability.io/vulnerability/CVE-2022-20939,Cisco Smart Software Manager On-Prem Vulnerability,"A vulnerability exists in the web-based management interface of Cisco Smart Software Manager On-Prem that may enable an authenticated, remote attacker to elevate their privileges on an affected system. This issue arises from insufficient safeguards surrounding sensitive user data. By exploiting this vulnerability, an attacker can gain access to specific logs on the system and utilize the gathered information to escalate privileges to the System Admin level. Cisco has issued software updates to address this vulnerability, and no workarounds are available.",Cisco,Cisco Smart Software Manager On-prem,4.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-11-15T15:25:32.612Z,0 CVE-2024-20419,https://securityvulnerability.io/vulnerability/CVE-2024-20419,Unauthenticated Password Change Vulnerability in Cisco SSM On-Prem,"The vulnerability with the identifier CVE-2024-20419 is a severe one in Cisco's Smart Software Manager On-Prem software. It enables an unauthenticated attacker to change the password of any user, including administrative users, by sending specially crafted HTTP requests to the affected system. Due to the high severity and ease of exploitation, it is crucial for organizations to apply the available patches promptly. While there are no known instances of exploitation in the wild yet, the potential impact of this vulnerability, especially in industries such as finance, utilities, and government, is significant. It is part of a set of issues addressed by Cisco, with another critical flaw also being patched.",Cisco,Cisco Smart Software Manager On-prem,10,CRITICAL,0.0017399999778717756,false,,true,false,false,,,false,false,,2024-07-17T16:27:35.418Z,0 CVE-2023-20110,https://securityvulnerability.io/vulnerability/CVE-2023-20110,Cisco Smart Software Manager On-Prem SQL Injection Vulnerability,"A vulnerability in the web-based management interface of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read sensitive data on the underlying database.",Cisco,Cisco Smart Software Manager On-prem,6.5,MEDIUM,0.000699999975040555,false,,false,false,true,2023-07-16T10:53:51.000Z,true,false,false,,2023-05-18T03:15:00.000Z,0 CVE-2022-20808,https://securityvulnerability.io/vulnerability/CVE-2022-20808,Cisco Smart Software Manager On-Prem Denial of Service Vulnerability,"A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incorrect handling of multiple simultaneous device registrations on Cisco SSM On-Prem. An attacker could exploit this vulnerability by sending multiple device registration requests to Cisco SSM On-Prem. A successful exploit could allow the attacker to cause a DoS condition on an affected device.",Cisco,Cisco Smart Software Manager On-prem,7.7,HIGH,0.0010900000343099236,false,,false,false,true,2024-08-03T03:15:42.000Z,,false,false,,2022-07-06T00:00:00.000Z,0 CVE-2021-34766,https://securityvulnerability.io/vulnerability/CVE-2021-34766,Cisco Smart Software Manager Privilege Escalation Vulnerability,"A vulnerability in the web UI of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges and create, read, update, or delete records and settings in multiple functions. This vulnerability is due to insufficient authorization of the System User and System Operator role capabilities. An attacker could exploit this vulnerability by directly accessing a web resource. A successful exploit could allow the attacker to create, read, update, or delete records and settings in multiple functions without the necessary permissions on the web UI.",Cisco,Cisco Smart Software Manager On-prem,5.4,MEDIUM,0.0028099999763071537,false,,false,false,true,2024-08-04T02:15:23.000Z,,false,false,,2021-10-06T00:00:00.000Z,0 CVE-2021-1219,https://securityvulnerability.io/vulnerability/CVE-2021-1219,Cisco Smart Software Manager Satellite Static Credential Vulnerability,"A vulnerability in Cisco Smart Software Manager Satellite could allow an authenticated, local attacker to access sensitive information on an affected system. The vulnerability is due to insufficient protection of static credentials in the affected software. An attacker could exploit this vulnerability by gaining access to the static credential that is stored on the local device. A successful exploit could allow the attacker to view static credentials, which the attacker could use to carry out further attacks.",Cisco,Cisco Smart Software Manager On-prem,7.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-03T17:15:45.000Z,,false,false,,2021-01-20T00:00:00.000Z,0 CVE-2021-1222,https://securityvulnerability.io/vulnerability/CVE-2021-1222,Cisco Smart Software Manager Satellite SQL Injection Vulnerability,"A vulnerability in the web-based management interface of Cisco Smart Software Manager Satellite could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates values within SQL queries. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database or the operating system.",Cisco,Cisco Smart Software Manager On-prem,6.8,MEDIUM,0.0008399999933317304,false,,false,false,true,2024-08-03T17:15:45.000Z,,false,false,,2021-01-20T00:00:00.000Z,0 CVE-2021-1218,https://securityvulnerability.io/vulnerability/CVE-2021-1218,Cisco Smart Software Manager Satellite Open Redirect Vulnerability,"A vulnerability in the web management interface of Cisco Smart Software Manager satellite could allow an authenticated, remote attacker to redirect a user to an undesired web page. The vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request that could cause the web application to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious website.",Cisco,Cisco Smart Software Manager On-prem,4.6,MEDIUM,0.0007099999929778278,false,,false,false,true,2024-08-03T17:15:45.000Z,,false,false,,2021-01-20T00:00:00.000Z,0 CVE-2021-1138,https://securityvulnerability.io/vulnerability/CVE-2021-1138,Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities,"Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.",Cisco,Cisco Smart Software Manager On-prem,9.8,CRITICAL,0.012400000356137753,false,,false,false,true,2024-08-03T17:15:41.000Z,,false,false,,2021-01-20T00:00:00.000Z,0 CVE-2021-1139,https://securityvulnerability.io/vulnerability/CVE-2021-1139,Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities,"Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.",Cisco,Cisco Smart Software Manager On-prem,9.8,CRITICAL,0.010289999656379223,false,,false,false,true,2024-08-03T17:15:41.000Z,,false,false,,2021-01-20T00:00:00.000Z,0 CVE-2021-1140,https://securityvulnerability.io/vulnerability/CVE-2021-1140,Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities,"Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.",Cisco,Cisco Smart Software Manager On-prem,9.8,CRITICAL,0.012400000356137753,false,,false,false,true,2024-08-03T17:15:41.000Z,,false,false,,2021-01-20T00:00:00.000Z,0 CVE-2021-1141,https://securityvulnerability.io/vulnerability/CVE-2021-1141,Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities,"Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.",Cisco,Cisco Smart Software Manager On-prem,9.8,CRITICAL,0.010289999656379223,false,,false,false,true,2024-08-03T17:15:41.000Z,,false,false,,2021-01-20T00:00:00.000Z,0 CVE-2021-1142,https://securityvulnerability.io/vulnerability/CVE-2021-1142,Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities,"Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.",Cisco,Cisco Smart Software Manager On-prem,9.8,CRITICAL,0.012400000356137753,false,,false,false,true,2024-08-03T17:15:41.000Z,,false,false,,2021-01-20T00:00:00.000Z,0 CVE-2020-3443,https://securityvulnerability.io/vulnerability/CVE-2020-3443,Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability,"A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges and execute commands with higher privileges. The vulnerability is due to insufficient authorization of the System Operator role capabilities. An attacker could exploit this vulnerability by logging in with the System Operator role, performing a series of actions, and then assuming a new higher privileged role. A successful exploit could allow the attacker to perform all actions associated with the privilege of the assumed role. If that role is an administrative role, the attacker would gain full access to the device.",Cisco,Cisco Smart Software Manager On-prem,8.8,HIGH,0.0026599999982863665,false,,false,false,true,2024-08-04T08:16:40.000Z,,false,false,,2020-08-26T17:15:00.000Z,0 CVE-2020-3245,https://securityvulnerability.io/vulnerability/CVE-2020-3245,Cisco Smart Software Manager On-Prem Improper Access Control Vulnerability,"A vulnerability in the web application of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to create arbitrary user accounts. The vulnerability is due to the lack of authorization controls in the web application. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to add user accounts to the configuration of an affected device. These accounts would not be administrator or operator accounts.",Cisco,Cisco Smart Software Manager On-prem,5.3,MEDIUM,0.0009399999980814755,false,,false,false,true,2024-08-04T08:16:31.000Z,,false,false,,2020-06-18T03:15:00.000Z,0 CVE-2020-3158,https://securityvulnerability.io/vulnerability/CVE-2020-3158,Cisco Smart Software Manager On-Prem Static Default Credential Vulnerability,"A vulnerability in the High Availability (HA) service of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to access a sensitive part of the system with a high-privileged account. The vulnerability is due to a system account that has a default and static password and is not under the control of the system administrator. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to obtain read and write access to system data, including the configuration of an affected device. The attacker would gain access to a sensitive portion of the system, but the attacker would not have full administrative rights to control the device.",Cisco,Cisco Smart Software Manager On-prem,9.8,CRITICAL,0.003659999929368496,false,,false,false,true,2024-08-04T08:16:27.000Z,,false,false,,2020-02-19T00:00:00.000Z,0 CVE-2019-16029,https://securityvulnerability.io/vulnerability/CVE-2019-16029,Cisco Smart Software Manager On-Prem Web Interface Denial of Service Vulnerability,"A vulnerability in the application programming interface (API) of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to change user account information which can prevent users from logging in, resulting in a denial of service (DoS) condition of the web interface. The vulnerability is due to the lack of input validation in the API. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to change or corrupt user account information which could grant the attacker administrator access or prevent legitimate user access to the web interface, resulting in a denial of service (DoS) condition.",Cisco,Cisco Smart Software Manager On-prem,8.2,HIGH,0.0012199999764561653,false,,false,false,true,2024-08-05T02:15:48.000Z,,false,false,,2020-01-26T05:15:00.000Z,0