← Back to CVEs
CVE-2021-40113
CRITICAL10.0
Description
Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
CVE Details
CVSS v3.1 Score10.0
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published11/4/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
cisco:catalyst_pon_switch_cgp-ont-1pcisco:catalyst_pon_switch_cgp-ont-1p_firmwarecisco:catalyst_pon_switch_cgp-ont-4pcisco:catalyst_pon_switch_cgp-ont-4p_firmwarecisco:catalyst_pon_switch_cgp-ont-4pvcisco:catalyst_pon_switch_cgp-ont-4pv_firmwarecisco:catalyst_pon_switch_cgp-ont-4pvccisco:catalyst_pon_switch_cgp-ont-4pvc_firmwarecisco:catalyst_pon_switch_cgp-ont-4tvcwcisco:catalyst_pon_switch_cgp-ont-4tvcw_firmware
Weaknesses (CWE)
CWE-284CWE-78
References
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr(psirt@cisco.com)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.