CVE-2021-34795

Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-1p:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-1p_firmware:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-4p:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-4p_firmware:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-4pvc:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-4pvc_firmware:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-4tvcw:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-4tvcw_firmware:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-4pv:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-4pv_firmware:*:*:*:*:*:*:*:*

History

25 Apr 2022, 17:28

Type Values Removed Values Added
CWE CWE-798 CWE-1188

06 Nov 2021, 02:58

Type Values Removed Values Added
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr - Patch, Vendor Advisory
CPE cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-4tvcw:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-4pvc:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-4tvcw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-1p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-4pv:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-1p:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-4pvc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-4p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_pon_switch_cgp-ont-4p:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_pon_switch_cgp-ont-4pv_firmware:*:*:*:*:*:*:*:*
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8

04 Nov 2021, 16:19

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-04 16:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-34795

Mitre link : CVE-2021-34795

CVE.ORG link : CVE-2021-34795


JSON object : View

Products Affected

cisco

  • catalyst_pon_switch_cgp-ont-4tvcw_firmware
  • catalyst_pon_switch_cgp-ont-4pv
  • catalyst_pon_switch_cgp-ont-4tvcw
  • catalyst_pon_switch_cgp-ont-4pv_firmware
  • catalyst_pon_switch_cgp-ont-1p_firmware
  • catalyst_pon_switch_cgp-ont-4pvc
  • catalyst_pon_switch_cgp-ont-4p
  • catalyst_pon_switch_cgp-ont-4p_firmware
  • catalyst_pon_switch_cgp-ont-4pvc_firmware
  • catalyst_pon_switch_cgp-ont-1p
CWE
CWE-1188

Insecure Default Initialization of Resource

CWE-284

Improper Access Control