Vulnerability Description
Authentication bypass vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent unauthenticated attacker who can access the affected product to download configuration files and/or log files, and upload configuration files and/or firmware. They are affected when running in ST(Standalone) mode.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Furunosystems | Acera 1310 Firmware | <= 01.26 |
| Furunosystems | Acera 1310 | - |
| Furunosystems | Acera 1320 Firmware | <= 01.26 |
| Furunosystems | Acera 1320 | - |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/vu/JVNVU94497038/Third Party Advisory
- https://www.furunosystems.co.jp/news/info/vulner20231002.htmlVendor Advisory
- https://jvn.jp/en/vu/JVNVU94497038/Third Party Advisory
- https://www.furunosystems.co.jp/news/info/vulner20231002.htmlVendor Advisory
FAQ
What is CVE-2023-42771?
CVE-2023-42771 is a vulnerability with a CVSS score of 8.8 (HIGH). Authentication bypass vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent unauthenticated attacker who can access the af...
How severe is CVE-2023-42771?
CVE-2023-42771 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-42771?
Check the references section above for vendor advisories and patch information. Affected products include: Furunosystems Acera 1310 Firmware, Furunosystems Acera 1310, Furunosystems Acera 1320 Firmware, Furunosystems Acera 1320.