First published: Thu Oct 07 2021(Updated: )
In LCOS 10.40 to 10.42.0473-RU3 with SNMPv3 enabled on LANCOM devices, changing the password of the root user via the CLI does not change the password of the root user for SNMPv3 access. (However, changing the password of the root user via LANconfig does change the password of the root user for SNMPv3 access.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lancom Systems LCOS | >=10.40<10.42.0473 | |
Lancom Systems LCOS | =10.42.0473 | |
Lancom Systems LCOS | =10.42.0473-release_update1 | |
Lancom Systems LCOS | =10.42.0473-release_update2 | |
Lancom Systems LCOS | =10.42.0473-release_update3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33903 is considered a medium severity vulnerability affecting LANCOM devices.
To mitigate CVE-2021-33903, ensure that the root user password is changed via LANconfig instead of the CLI.
CVE-2021-33903 affects LANCOM devices running LCOS versions 10.40 through 10.42.0473 with SNMPv3 enabled.
CVE-2021-33903 affects the root user password synchronization between CLI and SNMPv3 access in LANCOM devices.
Yes, remote exploitation is possible with CVE-2021-33903 due to the SNMPv3 protocol weaknesses.