Authentication bypass vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent unauthenticated attacker who can access the affected product to download configuration files and/or log files, and upload configuration files and/or firmware. They are affected when running in ST(Standalone) mode.
References
| Link | Resource |
|---|---|
| https://jvn.jp/en/vu/JVNVU94497038/ | Third Party Advisory |
| https://www.furunosystems.co.jp/news/info/vulner20231002.html | Vendor Advisory |
| https://jvn.jp/en/vu/JVNVU94497038/ | Third Party Advisory |
| https://www.furunosystems.co.jp/news/info/vulner20231002.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://jvn.jp/en/vu/JVNVU94497038/ - Third Party Advisory | |
| References | () https://www.furunosystems.co.jp/news/info/vulner20231002.html - Vendor Advisory |
20 Sep 2024, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-10-03 01:15
Updated : 2024-11-21 08:23
NVD link : CVE-2023-42771
Mitre link : CVE-2023-42771
CVE.ORG link : CVE-2023-42771
JSON object : View
Products Affected
furunosystems
- acera_1320
- acera_1310
- acera_1310_firmware
- acera_1320_firmware
