Описание
Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00925
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Cisco ONS15454 and ONS15327 running ONS before 3.4 have an account for the VxWorks Operating System in the TCC, TCC+ and XTC that cannot be changed or disabled, which allows remote attackers to gain privileges by connecting to the account via Telnet.
EPSS
Процентиль: 75%
0.00925
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other