Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-47203 | Authentication bypass vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent unauthenticated attacker who can access the affected product to download configuration files and/or log files, and upload configuration files and/or firmware. They are affected when running in ST(Standalone) mode. |
Fri, 20 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-288 | |
| CPEs | cpe:2.3:o:furunosystems:acera_1310_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:furunosystems:acera_1320_firmware:-:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-20T13:36:28.745Z
Reserved: 2023-09-22T04:36:33.436Z
Link: CVE-2023-42771
Updated: 2024-08-02T19:30:24.335Z
Status : Modified
Published: 2023-10-03T01:15:56.967
Modified: 2024-11-21T08:23:07.800
Link: CVE-2023-42771
No data.
OpenCVE Enrichment
No data.
EUVD