CVE-2020-29062

9.8 CRITICAL

📋 TL;DR

This vulnerability affects multiple CDATA optical line terminal (OLT) devices that have a default blank password for the guest account. This allows unauthenticated attackers to gain unauthorized access to affected devices. Organizations using these specific CDATA OLT models are at risk.

💻 Affected Systems

Products:
  • CDATA 72408A
  • CDATA 9008A
  • CDATA 9016A
  • CDATA 92408A
  • CDATA 92416A
  • CDATA 9288
  • CDATA 97016
  • CDATA 97024P
  • CDATA 97028P
  • CDATA 97042P
  • CDATA 97084P
  • CDATA 97168P
  • CDATA FD1002S
  • CDATA FD1104
  • CDATA FD1104B
  • CDATA FD1104S
  • CDATA FD1104SN
  • CDATA FD1108S
  • CDATA FD1204S-R2
  • CDATA FD1204SN
  • CDATA FD1204SN-R2
  • CDATA FD1208S-R2
  • CDATA FD1216S-R1
  • CDATA FD1608GS
  • CDATA FD1608SN
  • CDATA FD1616GS
  • CDATA FD1616SN
  • CDATA FD8000
Versions: All versions with default configuration
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are vulnerable out-of-the-box with default configurations. The guest account has a blank password by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network infrastructure, allowing attackers to reconfigure devices, intercept traffic, or use devices as pivot points into internal networks.

🟠

Likely Case

Unauthorized access to device management interfaces leading to configuration changes, service disruption, or credential harvesting.

🟢

If Mitigated

Limited impact if guest accounts are disabled or strong authentication is enforced.

🌐 Internet-Facing: HIGH - Devices exposed to the internet with default credentials are trivially exploitable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial - attackers can simply attempt to log in with guest account and blank password. Public blog posts demonstrate the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Contact CDATA vendor for firmware updates or security guidance.

🔧 Temporary Workarounds

Disable Guest Account

all

Remove or disable the guest account on affected devices

Login to device management interface
Navigate to user management
Disable or delete guest account

Set Strong Password for Guest Account

all

If guest account must remain enabled, set a strong, unique password

Login to device management interface
Navigate to user management
Change guest account password to strong value

🧯 If You Can't Patch

  • Network segmentation: Isolate affected devices from untrusted networks
  • Access control: Restrict management interface access to authorized IPs only

🔍 How to Verify

Check if Vulnerable:

Attempt to log into device management interface using username 'guest' with blank password

Check Version:

Check device firmware version via management interface or console

Verify Fix Applied:

Verify guest account is disabled or has strong password by attempting login

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts followed by successful guest login
  • Configuration changes from guest account

Network Indicators:

  • Unauthorized access to management interfaces
  • Traffic from guest account sessions

SIEM Query:

source="device_logs" (username="guest" AND (login="success" OR action="configuration_change"))

🔗 References

📤 Share & Export