### [CVE-2024-20419](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20419) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Smart%20Software%20Manager%20On-Prem&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%208-202206%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Unverified%20Password%20Change&color=brighgreen) ### Description A vulnerability in the authentication system of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to change the password of any user, including administrative users. This vulnerability is due to improper implementation of the password-change process. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user. ### POC #### Reference - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy #### Github No PoCs found on GitHub currently.