This vulnerability is due to improper implementation of the password-change process. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 31 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cisco:smart_software_manager_on-prem:*:*:*:*:*:*:*:* |
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco smart Software Manager On-prem |
|
| CPEs | cpe:2.3:a:cisco:smart_software_manager_on-prem:8-202206:*:*:*:*:*:*:* | |
| Vendors & Products |
Cisco
Cisco smart Software Manager On-prem |
|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-02-13T17:32:31.164Z
Reserved: 2023-11-08T15:08:07.664Z
Link: CVE-2024-20419
Updated: 2024-08-01T21:59:41.794Z
Status : Analyzed
Published: 2024-07-17T17:15:14.143
Modified: 2025-07-31T15:19:25.703
Link: CVE-2024-20419
No data.
OpenCVE Enrichment
No data.