CVE-2021-34757

Multiple vulnerabilities in Cisco Business 220 Series Smart Switches firmware could allow an attacker with Administrator privileges to access sensitive login credentials or reconfigure the passwords on the user account. For more information about these vulnerabilities, see the Details section of this advisory.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:business_220-8t-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8t-e-2g:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:business_220-8p-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8p-e-2g:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:cisco:business_220-8fp-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8fp-e-2g:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:cisco:business_220-16t-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-16t-2g:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:cisco:business_220-16p-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-16p-2g:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:cisco:business_220-24t-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24t-4g:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:cisco:business_220-24p-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24p-4g:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:cisco:business_220-24fp-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24fp-4g:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:cisco:business_220-48t-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48t-4g:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:cisco:business_220-48p-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48p-4g:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:cisco:business_220-24t-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24t-4x:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:cisco:business_220-24p-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24p-4x:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:cisco:business_220-24fp-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24fp-4x:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:cisco:business_220-48t-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48t-4x:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:cisco:business_220-48p-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48p-4x:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:cisco:business_220-48fp-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48fp-4x:-:*:*:*:*:*:*:*

History

24 Oct 2022, 14:26

Type Values Removed Values Added
CWE CWE-200 CWE-798

14 Oct 2021, 18:44

Type Values Removed Values Added
CPE cpe:2.3:o:cisco:business_220-48p-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48fp-4x:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-16p-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24fp-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48t-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8t-e-2g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24fp-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-16t-2g:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-8p-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8fp-e-2g:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-8fp-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24t-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-48fp-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48p-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24t-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48p-4x:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-16t-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8p-e-2g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24p-4x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48t-4x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24fp-4x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24t-4x:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-48p-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24t-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-48t-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24p-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24p-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24p-4g:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-8t-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24fp-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-48t-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-16p-2g:-:*:*:*:*:*:*:*
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 3.6
v3 : 5.5
CWE CWE-200

06 Oct 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-06 20:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-34757

Mitre link : CVE-2021-34757

CVE.ORG link : CVE-2021-34757


JSON object : View

Products Affected

cisco

  • business_220-8t-e-2g
  • business_220-24t-4g
  • business_220-24fp-4x_firmware
  • business_220-16p-2g_firmware
  • business_220-16t-2g_firmware
  • business_220-48p-4x_firmware
  • business_220-48fp-4x
  • business_220-24fp-4g_firmware
  • business_220-24t-4x
  • business_220-48t-4x
  • business_220-24p-4x_firmware
  • business_220-24t-4g_firmware
  • business_220-48fp-4x_firmware
  • business_220-24t-4x_firmware
  • business_220-24fp-4x
  • business_220-8p-e-2g
  • business_220-8p-e-2g_firmware
  • business_220-24p-4x
  • business_220-8fp-e-2g_firmware
  • business_220-48t-4g
  • business_220-48p-4x
  • business_220-16t-2g
  • business_220-24p-4g
  • business_220-48t-4x_firmware
  • business_220-48t-4g_firmware
  • business_220-16p-2g
  • business_220-24p-4g_firmware
  • business_220-8fp-e-2g
  • business_220-24fp-4g
  • business_220-48p-4g_firmware
  • business_220-48p-4g
  • business_220-8t-e-2g_firmware
CWE
CWE-798

Use of Hard-coded Credentials

CWE-540

Inclusion of Sensitive Information in Source Code