Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Cisco Fixes Hard-coded Credentials and Default SSH Key Issues

Cisco Fixes Hard-coded Credentials and Default SSH Key Issues

Cisco has released security updates to address critical security flaws allowing unauthenticated attackers to log in using hard-coded credentials or default SSH keys to take over unpatched devices.

CISA also encouraged users and administrators today to review Cisco’s advisories and apply all the necessary updates to block attempts to take over impacted systems.

Also Read: 4 Considerations In The PDPA Singapore Checklist: The Specifics

Catalyst PON Switch hard-coded credentials

The first of the two flaws patched on Wednesday (tracked as CVE-2021-34795) comes with a perfect 10/10 CVSS score and was found in the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT).

“A vulnerability in the Telnet service of Cisco Catalyst PON Series Switches ONT could allow an unauthenticated, remote attacker to log in to the affected device by using a debugging account that has a default, static password,” the company explains in an advisory published yesterday.

Luckily, this vulnerability can only be exploited by establishing a Telnet session to vulnerable devices and logging in with the hard-coded credential.

Since Telnet is not enabled by default on affected devices, this drastically limits the number of targets threat actors could attack.

The list of affected devices includes CGP-ONT-1P, CGP-ONT-4P, CGP-ONT-4PV, CGP-ONT-4PVC, and CGP-ONT-4TVCW Catalyst PON switches.

Cisco confirmed that CVE-2021-34795 does not impact Catalyst PON Switch CGP-OLT-8T and Catalyst PON Switch CGP-OLT-16T.

Default SSH keys in Cisco Policy Suite

The second critical security flaw patched yesterday is tracked as CVE-2021-40119 and is caused by the re-use of static SSH keys across Cisco Policy Suite installations.

“A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user,” Cisco explains.

“An attacker could exploit this vulnerability by extracting a key from a system under their control.”

Cisco Policy Suite software releases 21.2.0 and later will automatically create new SSH keys during the install process but not during upgrades.

To generate new SSH keys and propagate them to all machines, you can use the steps detailed in the Fixed Releases section of Cisco’s advisory.

Also Read: The 3 Main Benefits Of PDPA For Your Business

Cisco’s Product Security Incident Response Team (PSIRT) said that there is no public proof-of-concept exploit code available online for these two vulnerabilities and added that it’s not aware of any ongoing exploitation in the wild.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us