2025-04-03
CISA Adds Cisco CSLU Flaw to Known Exploited Vulnerabilities Catalog
The US Cybersecurity and Infrastructure Security Agency (CISA) has added a critical hardcoded credentials flaw in Cisco Smart Licensing Utility (CSLU) to the Known Exploited Vulnerabilities (KEV) Catalog. The vulnerability (CVE-2024-20439) was disclosed on September 4, 2024; Cisco released updates to address the issue at that time. CISA added the flaw to the KEV after confirmation that it is being actively exploited. In mid-March, Johannes Ullrich wrote in an Internet Storm Center diary that they were "seeing some exploit activity" of the flaw, chained with a second flaw that Cisco also patched in September, and in an April 1 update to the September advisory, Cisco notes, "In March 2025, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild."
Editor's Note
Last week, we detected the use of the exploit against some of our honeypots. The exploit is trivial, and the password used has been known for several months. The exploit had likely been used in more limited attacks well before we detected the use against our honeypots.

Johannes Ullrich
CVE-2024-20439 has a CVSS score of 9.8, and allows an attacker to login using a static administrative credential. Johannes discovered this flaw is being chained with an exploit of CVE-2024-20440, CSLU information disclosure vulnerability, to access log files and API credentials. The fix (there are no workarounds) is to deploy the fixed version of CSLU you're licensed for. This is a free update.

Lee Neely
Six months is long enough for any organization to patch for a known hardcoded credential flaw. So, if adding the vulnerability to the KEV spurs organizations to action, so be it. If I were on the company risk committee, I would be asking what took you so long.

Curtis Dukes
Are these Cisco Licensing Systems exposed to the internet? I've never seen one exposed, so I'm curious to know who runs this on the internet as if it's a router. Nothing should surprise me anymore, however.
