Skip to content

Commit

Permalink
Cisco Publishes Critical Update - 20240906003
Browse files Browse the repository at this point in the history
  • Loading branch information
LSerki committed Sep 6, 2024
1 parent 9dfdf10 commit ccd0fe4
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions docs/advisories/20240906003-Cisco-Publishes-Critical-Update.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,18 +6,18 @@ The WA SOC has been made aware of multiple vulnerabilities in Cisco Smart Licens

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| ------------------- | ---------- | ----------------------------------------------------------------- | ---- | ------------ |
| | | [CVE-2024-20439](https://nvd.nist.gov/vuln/detail/CVE-2024-20439) | 9.8 | **Critical** |
| | | [CVE-2024-20440](https://nvd.nist.gov/vuln/detail/CVE-2024-20440) | 7.5 | High |
| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| ------------------- | ---------- | ----------------------------------------------------------------------------------------------------------------------------------------- | ------------- | ---------------------------------------------------------------- |
| Cisco Smart Licensing Utility | versions before 2.3.0 | [CVE-2024-20439](https://nvd.nist.gov/vuln/detail/CVE-2024-20439) | 9.8 | **Critical** |
| Cisco Smart Licensing Utility | versions before 2.3.0 | [CVE-2024-20440](https://nvd.nist.gov/vuln/detail/CVE-2024-20440) | 7.5 | High |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)):
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- [Cisco Smart Licensing Utility Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw)

Expand Down

0 comments on commit ccd0fe4

Please sign in to comment.