Cisco Fixes Hard-coded Credentials, SSH Key Issues

November 5, 2021

Cisco recently released a security update to address two critical vulnerabilities: CVE-2021-34795 which allows attackers to gain access with hard-coded credentials, and CVE-2021-40119 which uses default SSH keys to take over unpatched devices.

The first vulnerability has been found in Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) and may allow a remote attacker to login to the affected device via a debugging account with a default, static password.”

However, the vulnerability is limited in that it can only be exploited by creating a Telnet session with vulnerable devices. Since Telnet is not enabled by default, the number of targets that a threat actor could attack is therefore limited.

The second vulnerability is caused by the re-use of static SSH keys in Cisco Policy Suite installations, allowing a remote attacker to log in to an affected system as the root user.

Cisco’s new software updates automatically generate new SSH keys during installation to address the vulnerability.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

February 23, 2026 Researchers say they’ve identified a new strain of Android malware that uses Google’s own Gemini AI model more...

February 23, 2026 Texas officials are warning about what could be the largest data breach in U.S. history, with notification more...

February 20, 2026 ATM jackpotting attacks are accelerating from rare security demonstrations into a growing criminal enterprise, according to a more...

February 20, 2026 Bitdefender Labs says it is tracking an ongoing scam campaign on Meta platforms targeting users in the more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn