Lucene search

K
ciscoCiscoCISCO-SA-CATPON-MULTIVULNS-CE3DSYGR
HistoryNov 03, 2021 - 4:00 p.m.

Cisco Catalyst PON Series Switches Optical Network Terminal Vulnerabilities

2021-11-0316:00:00
tools.cisco.com
37
cisco
catalyst
pon
switches
optical network terminal
web-based
management
interface
vulnerabilities
telnet
command injection
configuration
software updates
advisory
remote attacker
default credential

EPSS

0.002

Percentile

61.4%

Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions:

Log in with a default credential if the Telnet protocol is enabled
Perform command injection
Modify the configuration

For more information about these vulnerabilities, see the Details [“#details”] section of this advisory.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr”]

Affected configurations

Vulners
Node
ciscocatalyst_2800_seriesMatchany
OR
ciscocatalyst_2800_seriesMatchany

EPSS

0.002

Percentile

61.4%

Related for CISCO-SA-CATPON-MULTIVULNS-CE3DSYGR