Lucene search

K
ciscoCiscoCISCO-SA-SB-HARDCODED-CRED-MJCEXVX
HistoryOct 06, 2021 - 4:00 p.m.

Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities

2021-10-0616:00:00
tools.cisco.com
33
cisco
smart switches
firmware
vulnerabilities
administrator privileges
sensitive login credentials
passwords
software updates
security advisory
hardcoded credentials

EPSS

0.001

Percentile

28.4%

Multiple vulnerabilities in Cisco Business 220 Series Smart Switches firmware could allow an attacker with Administrator privileges to access sensitive login credentials or reconfigure the passwords on the user account.

For more information about these vulnerabilities, see the Details [“#details”] section of this advisory.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX”]

Affected configurations

Vulners
Node
ciscosmall_business_220_series_smart_plus_switchesMatchany
OR
ciscosmall_business_220_series_smart_plus_switchesMatchany
OR
ciscosmall_business_srp541wMatch220_series_smart_plus_switches
OR
ciscosmall_business_220_series_smart_plus_switchesMatchany
VendorProductVersionCPE
ciscosmall_business_220_series_smart_plus_switchesanycpe:2.3:a:cisco:small_business_220_series_smart_plus_switches:any:*:*:*:*:*:*:*
ciscosmall_business_srp541w220_series_smart_plus_switchescpe:2.3:h:cisco:small_business_srp541w:220_series_smart_plus_switches:*:*:*:*:*:*:*

EPSS

0.001

Percentile

28.4%

Related for CISCO-SA-SB-HARDCODED-CRED-MJCEXVX