Authentication bypass vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent unauthenticated attacker who can access the affected product to download configuration files and/or log files, and upload configuration files and/or firmware. They are affected when running in ST(Standalone) mode.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Link | Tags |
---|---|
https://www.furunosystems.co.jp/news/info/vulner20231002.html | vendor advisory |
https://jvn.jp/en/vu/JVNVU94497038/ | third party advisory |