Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst Pon Switch Cgp-ont-1p
Subscribe
Catalyst Pon Switch Cgp-ont-1p Firmware
Subscribe
Catalyst Pon Switch Cgp-ont-4p
Subscribe
Catalyst Pon Switch Cgp-ont-4p Firmware
Subscribe
Catalyst Pon Switch Cgp-ont-4pv
Subscribe
Catalyst Pon Switch Cgp-ont-4pv Firmware
Subscribe
Catalyst Pon Switch Cgp-ont-4pvc
Subscribe
Catalyst Pon Switch Cgp-ont-4pvc Firmware
Subscribe
Catalyst Pon Switch Cgp-ont-4tvcw
Subscribe
Catalyst Pon Switch Cgp-ont-4tvcw Firmware
Subscribe
|
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-07T21:53:19.817Z
Reserved: 2021-08-25T00:00:00.000Z
Link: CVE-2021-40113
Updated: 2024-08-04T02:27:31.502Z
Status : Modified
Published: 2021-11-04T16:15:09.217
Modified: 2024-11-21T06:23:35.777
Link: CVE-2021-40113
No data.
OpenCVE Enrichment
No data.