PatchSiren

PatchSiren cyber security CVE debrief

CVE-2018-10561 Dasan CVE debrief

CVE-2018-10561 is a Dasan Gigabit Passive Optical Network (GPON) router authentication bypass vulnerability. It was published and added to CISA’s Known Exploited Vulnerabilities catalog on 2022-03-31, which indicates it is a vulnerability CISA has identified as actively exploited. CISA notes the impacted product is end-of-life and should be disconnected if still in use.

Vendor
Dasan
Product
Gigabit Passive Optical Network (GPON) Routers
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-03-31
Original CVE updated
2022-03-31
Advisory published
2022-03-31
Advisory updated
2022-03-31

Who should care

Organizations that still operate Dasan GPON routers, especially network, telecom, and edge infrastructure teams responsible for customer or branch connectivity. Security teams should also care if these devices are present in asset inventories or unmanaged remote sites.

Technical summary

The available source corpus identifies an authentication bypass affecting Dasan GPON routers. CISA’s KEV entry marks the vulnerability as known exploited and states the impacted product is end-of-life. No CVSS score or deeper technical breakdown was supplied in the provided sources.

Defensive priority

High. Because the device family is end-of-life and CISA has listed the issue in KEV, exposed systems should be treated as urgent remediation candidates.

Recommended defensive actions

  • Inventory all Dasan GPON routers and confirm whether any are still deployed.
  • If the product is still in use, disconnect it as CISA recommends for this end-of-life device family.
  • Replace affected routers with supported equipment as soon as possible.
  • Restrict network exposure to management interfaces and isolate any device that cannot be immediately removed.
  • Verify whether any assets are reachable from untrusted networks and reduce access accordingly.
  • Track remediation against the KEV due date (2022-04-21) if historical compliance reporting is needed.

Evidence notes

This debrief is constrained to the supplied source corpus and official links. The CVE title/description identify the issue as a Dasan GPON router authentication bypass vulnerability. The CISA KEV metadata states the product is end-of-life and should be disconnected if still in use, and lists the vulnerability as known exploited. No CVSS score or additional technical detail was provided in the supplied data.

Official resources

CVE published 2022-03-31; CISA KEV date added 2022-03-31. This debrief uses the supplied publication dates and does not substitute generation time for the CVE date.