All the vulnerabilites related to zyxel - gs1900-24
cve-2021-35032
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | GS1900 series firmware |
Version: 2.60 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:49.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GS1900 series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "2.60" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the \u0027libsal.so\u0027 of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-28T10:42:07", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zyxel.com.tw", "ID": "CVE-2021-35032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GS1900 series firmware", "version": { "version_data": [ { "version_value": "2.60" } ] } } ] }, "vendor_name": "Zyxel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the \u0027libsal.so\u0027 of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call." } ] }, "impact": { "cvss": { "baseScore": "6.4", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml", "refsource": "CONFIRM", "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2021-35032", "datePublished": "2021-12-28T10:42:07", "dateReserved": "2021-06-17T00:00:00", "dateUpdated": "2024-08-04T00:33:49.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15802
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | x_refsource_MISC | |
https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) are used to encrypt and decrypt all passwords using AES256 in CBC mode. With the parameters known, all previously encrypted passwords can be decrypted. This includes the passwords that are part of configuration backups or otherwise embedded as part of the firmware." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:16:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15802", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) are used to encrypt and decrypt all passwords using AES256 in CBC mode. With the parameters known, all previously encrypted passwords can be decrypted. This includes the passwords that are part of configuration backups or otherwise embedded as part of the firmware." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html", "refsource": "MISC", "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "name": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml", "refsource": "CONFIRM", "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15802", "datePublished": "2019-11-14T20:16:03", "dateReserved": "2019-08-29T00:00:00", "dateUpdated": "2024-08-05T00:56:22.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34746
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | Zyxel GS1900 series firmware |
Version: < V2.70 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.990Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zyxel GS1900 series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "\u003c V2.70" } ] } ], "descriptions": [ { "lang": "en", "value": "An insufficient entropy vulnerability caused by the improper use of randomness sources with low entropy for RSA key pair generation was found in Zyxel GS1900 series firmware versions prior to V2.70. This vulnerability could allow an unauthenticated attacker to retrieve a private key by factoring the RSA modulus N in the certificate of the web administration interface." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-331", "description": "CWE-331: Insufficient Entropy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-20T01:50:09", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zyxel.com.tw", "ID": "CVE-2022-34746", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zyxel GS1900 series firmware", "version": { "version_data": [ { "version_value": "\u003c V2.70" } ] } } ] }, "vendor_name": "Zyxel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An insufficient entropy vulnerability caused by the improper use of randomness sources with low entropy for RSA key pair generation was found in Zyxel GS1900 series firmware versions prior to V2.70. This vulnerability could allow an unauthenticated attacker to retrieve a private key by factoring the RSA modulus N in the certificate of the web administration interface." } ] }, "impact": { "cvss": { "baseScore": "5.9", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-331: Insufficient Entropy" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches", "refsource": "CONFIRM", "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches" } ] } } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2022-34746", "datePublished": "2022-09-20T01:50:09", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15804
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | x_refsource_MISC | |
https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains \"Password recovery for specific user\" options. The menu is believed to be accessible using a serial console." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:15:46", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15804", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains \"Password recovery for specific user\" options. The menu is believed to be accessible using a serial console." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html", "refsource": "MISC", "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "name": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml", "refsource": "CONFIRM", "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15804", "datePublished": "2019-11-14T20:15:46", "dateReserved": "2019-08-29T00:00:00", "dateUpdated": "2024-08-05T00:56:22.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7256
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/566724 | third-party-advisory, x_refsource_CERT-VN | |
http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:43:45.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#566724", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#566724", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2015-7256", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#566724", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/566724" }, { "name": "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml", "refsource": "CONFIRM", "url": "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2015-7256", "datePublished": "2017-09-27T18:00:00", "dateReserved": "2015-09-18T00:00:00", "dateUpdated": "2024-08-06T07:43:45.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15799
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | x_refsource_MISC | |
https://vimeo.com/354726424 | x_refsource_MISC | |
https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vimeo.com/354726424" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted passwords for all users on the device. As these passwords are encrypted using well-known and static parameters, they can be decrypted and the original passwords (including the administrator password) can be obtained." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:16:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vimeo.com/354726424" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15799", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted passwords for all users on the device. As these passwords are encrypted using well-known and static parameters, they can be decrypted and the original passwords (including the administrator password) can be obtained." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html", "refsource": "MISC", "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "name": "https://vimeo.com/354726424", "refsource": "MISC", "url": "https://vimeo.com/354726424" }, { "name": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml", "refsource": "CONFIRM", "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15799", "datePublished": "2019-11-14T20:16:33", "dateReserved": "2019-08-29T00:00:00", "dateUpdated": "2024-08-05T00:56:22.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15800
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | x_refsource_MISC | |
https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:16:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15800", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html", "refsource": "MISC", "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "name": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml", "refsource": "CONFIRM", "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15800", "datePublished": "2019-11-14T20:16:20", "dateReserved": "2019-08-29T00:00:00", "dateUpdated": "2024-08-05T00:56:22.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35031
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | GS1900 series firmware |
Version: 2.60 |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:49.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GS1900 series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "2.60" } ] }, { "product": "XGS1210 series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "1.00(ABTY.4)C0" } ] }, { "product": "XGS1250 series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "1.00(ABWE.0)C0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-28T16:05:43", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zyxel.com.tw", "ID": "CVE-2021-35031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GS1900 series firmware", "version": { "version_data": [ { "version_value": "2.60" } ] } }, { "product_name": "XGS1210 series firmware", "version": { "version_data": [ { "version_value": "1.00(ABTY.4)C0" } ] } }, { "product_name": "XGS1250 series firmware", "version": { "version_data": [ { "version_value": "1.00(ABWE.0)C0" } ] } } ] }, "vendor_name": "Zyxel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device." } ] }, "impact": { "cvss": { "baseScore": "6.8", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml", "refsource": "CONFIRM", "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2021-35031", "datePublished": "2021-12-28T10:36:23", "dateReserved": "2021-06-17T00:00:00", "dateUpdated": "2024-08-04T00:33:49.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45853
Vulnerability from cvelistv5
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Zyxel | GS1900-8HP firmware |
Version: V2.70(AAHI.3) |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:24:03.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-privilege-escalation-vulnerability-in-gs1900-series-switches" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45853", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-10T17:32:17.796591Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-10T17:32:54.505Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GS1900-8HP firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "V2.70(AAHI.3)" } ] }, { "defaultStatus": "unaffected", "product": "GS1900-8 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "V2.70(AAHH.3)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eV2.70(AAHH.3)\u003c/span\u003e\u0026nbsp;and the GS1900-8HP firmware version\u0026nbsp;V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as \u0027root\u0027 on a vulnerable device via SSH." } ], "value": "The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version \n\nV2.70(AAHH.3)\u00a0and the GS1900-8HP firmware version\u00a0V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as \u0027root\u0027 on a vulnerable device via SSH." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-06T01:35:03.430Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-privilege-escalation-vulnerability-in-gs1900-series-switches" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2022-45853", "datePublished": "2023-05-30T10:02:46.637Z", "dateReserved": "2022-11-23T08:05:40.138Z", "dateUpdated": "2025-01-10T17:32:54.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15803
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | x_refsource_MISC | |
https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return TRUE with no actual checks performed. The diagnostics menu allows for reading/writing arbitrary registers and various other configuration parameters which are believed to be related to the network interface chips." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:15:56", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15803", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return TRUE with no actual checks performed. The diagnostics menu allows for reading/writing arbitrary registers and various other configuration parameters which are believed to be related to the network interface chips." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html", "refsource": "MISC", "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "name": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml", "refsource": "CONFIRM", "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15803", "datePublished": "2019-11-14T20:15:56", "dateReserved": "2019-08-29T00:00:00", "dateUpdated": "2024-08-05T00:56:22.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35140
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | GS1900-24EP firmware |
Version: V2.70(ABTO.5) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:23:59.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-improper-privilege-management-vulnerability-in-gs1900-series-switches" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35140", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:36:49.739422Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T18:54:22.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GS1900-24EP firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "V2.70(ABTO.5)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The improper privilege management vulnerability in the Zyxel GS1900-24EP switch firmware version\u0026nbsp;V2.70(ABTO.5) could allow an authenticated local user with read-only access to modify system settings on a vulnerable device." } ], "value": "The improper privilege management vulnerability in the Zyxel GS1900-24EP switch firmware version\u00a0V2.70(ABTO.5) could allow an authenticated local user with read-only access to modify system settings on a vulnerable device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-07T01:44:18.953Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-improper-privilege-management-vulnerability-in-gs1900-series-switches" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-35140", "datePublished": "2023-11-07T01:44:18.953Z", "dateReserved": "2023-06-14T06:26:48.564Z", "dateUpdated": "2024-09-04T18:54:22.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8882
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | GS1900-48 firmware |
Version: <= V2.80(AAHN.1)C0 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8882", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T14:26:19.164032Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T14:27:10.174Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GS1900-48 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "\u003c= V2.80(AAHN.1)C0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A buffer overflow vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier\u0026nbsp;could allow an authenticated, LAN-based attacker with administrator privileges to cause denial of service (DoS) conditions via a crafted URL." } ], "value": "A buffer overflow vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier\u00a0could allow an authenticated, LAN-based attacker with administrator privileges to cause denial of service (DoS) conditions via a crafted URL." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:23:57.405Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-and-buffer-overflow-vulnerabilities-in-gs1900-series-switches-11-12-2024" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2024-8882", "datePublished": "2024-11-12T01:23:57.405Z", "dateReserved": "2024-09-16T02:29:48.579Z", "dateUpdated": "2024-11-12T14:27:10.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35030
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | GS1900-8 Firmware |
Version: 2.60 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:49.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_XSS_vulnerability_of_GS1900_series_switches.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GS1900-8 Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "2.60" } ] } ], "datePublic": "2021-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in the CGI program in Zyxel GS1900-8 firmware version V2.60, that did not properly sterilize packet contents and could allow an authenticated, local user to perform a cross-site scripting (XSS) attack via a crafted LLDP packet." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-26T11:20:40", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_XSS_vulnerability_of_GS1900_series_switches.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zyxel.com.tw", "DATE_PUBLIC": "2021-07-27 10:00:00+0800", "ID": "CVE-2021-35030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GS1900-8 Firmware", "version": { "version_data": [ { "version_value": "2.60" } ] } } ] }, "vendor_name": "Zyxel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in the CGI program in Zyxel GS1900-8 firmware version V2.60, that did not properly sterilize packet contents and could allow an authenticated, local user to perform a cross-site scripting (XSS) attack via a crafted LLDP packet." } ] }, "impact": { "cvss": { "baseScore": "3.5", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zyxel.com/support/Zyxel_security_advisory_for_XSS_vulnerability_of_GS1900_series_switches.shtml", "refsource": "MISC", "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_XSS_vulnerability_of_GS1900_series_switches.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2021-35030", "datePublished": "2021-07-26T11:20:40.191209Z", "dateReserved": "2021-06-17T00:00:00", "dateUpdated": "2024-09-17T01:46:12.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8881
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | GS1900-48 firmware |
Version: <= V2.80(AAHN.1)C0 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gs1900-48_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "2.80(AAHN.1)C0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-8881", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T16:07:07.517356Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:16:27.550Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GS1900-48 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "\u003c= V2.80(AAHN.1)C0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A post-authentication command injection vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to execute some operating system (OS) commands on an affected device by sending a crafted HTTP request." } ], "value": "A post-authentication command injection vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to execute some operating system (OS) commands on an affected device by sending a crafted HTTP request." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:17:36.728Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-and-buffer-overflow-vulnerabilities-in-gs1900-series-switches-11-12-2024" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2024-8881", "datePublished": "2024-11-12T01:17:36.728Z", "dateReserved": "2024-09-16T02:29:47.178Z", "dateUpdated": "2024-11-12T16:16:27.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-38270
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | GS1900-10HP firmware |
Version: V2.80(AAZI.0)C0 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38270", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T15:13:31.308353Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-10T15:15:34.477Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GS1900-10HP firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "V2.80(AAZI.0)C0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An insufficient entropy vulnerability caused by the improper use of a randomness function with low entropy for web authentication tokens generation exists in the Zyxel GS1900-10HP firmware version V2.80(AAZI.0)C0. This vulnerability could allow a LAN-based attacker a slight chance to gain a valid session token if multiple authenticated sessions are alive." } ], "value": "An insufficient entropy vulnerability caused by the improper use of a randomness function with low entropy for web authentication tokens generation exists in the Zyxel GS1900-10HP firmware version V2.80(AAZI.0)C0. This vulnerability could allow a LAN-based attacker a slight chance to gain a valid session token if multiple authenticated sessions are alive." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-331", "description": "CWE-331 Insufficient Entropy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T01:20:09.147Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-for-web-authentication-tokens-generation-in-gs1900-series-switches-09-10-2024" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2024-38270", "datePublished": "2024-09-10T01:20:09.147Z", "dateReserved": "2024-06-12T09:11:12.898Z", "dateUpdated": "2024-09-10T15:15:34.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15801
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | x_refsource_MISC | |
https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:16:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15801", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html", "refsource": "MISC", "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "name": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml", "refsource": "CONFIRM", "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15801", "datePublished": "2019-11-14T20:16:08", "dateReserved": "2019-08-29T00:00:00", "dateUpdated": "2024-08-05T00:56:22.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201911-1312
Vulnerability from variot
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.). Zyxel GS1900 There is an input validation vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan.
A security vulnerability exists in Zyxel GS1900 using firmware version 2.50 (AAHH.0) prior to C0, which is due to missing input in the 'cmd_sys_traceroute_exec()', 'cmd_sys_arp_clear()', and 'cmd_sys_ping_exec()' functions in the libclicmd.so library Verification check. An attacker could exploit this vulnerability to execute arbitrary code on the switch
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1312", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aazi.0\\)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahk.0\\)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahj.0\\)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahi.0\\)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aaho.0\\)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahm.0\\)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahh.0\\)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahn.0\\)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahl.0\\)c0" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900 \u003c2.50 c0", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41672" }, { "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "db": "NVD", "id": "CVE-2019-15800" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-15800" } ] }, "cve": "CVE-2019-15800", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2019-15800", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-41672", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-15800", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-15800", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-41672", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201911-992", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41672" }, { "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "db": "NVD", "id": "CVE-2019-15800" }, { "db": "CNNVD", "id": "CNNVD-201911-992" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.). Zyxel GS1900 There is an input validation vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan. \n\nA security vulnerability exists in Zyxel GS1900 using firmware version 2.50 (AAHH.0) prior to C0, which is due to missing input in the \u0027cmd_sys_traceroute_exec()\u0027, \u0027cmd_sys_arp_clear()\u0027, and \u0027cmd_sys_ping_exec()\u0027 functions in the libclicmd.so library Verification check. An attacker could exploit this vulnerability to execute arbitrary code on the switch", "sources": [ { "db": "NVD", "id": "CVE-2019-15800" }, { "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "db": "CNVD", "id": "CNVD-2019-41672" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-15800", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-012183", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-41672", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-992", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41672" }, { "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "db": "NVD", "id": "CVE-2019-15800" }, { "db": "CNNVD", "id": "CNNVD-201911-992" } ] }, "id": "VAR-201911-1312", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-41672" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41672" } ] }, "last_update_date": "2023-12-18T12:43:13.895000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel security advisory for GS1900 switch vulnerabilities", "trust": 0.8, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "title": "Patch for Unknown vulnerability in ZyXEL GS1900 (CNVD-2019-41672)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/191499" }, { "title": "ZyXEL GS1900 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=103376" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41672" }, { "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "db": "CNNVD", "id": "CNNVD-201911-992" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "db": "NVD", "id": "CVE-2019-15800" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15800" }, { "trust": 1.6, "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "trust": 1.6, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15800" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41672" }, { "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "db": "NVD", "id": "CVE-2019-15800" }, { "db": "CNNVD", "id": "CNNVD-201911-992" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-41672" }, { "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "db": "NVD", "id": "CVE-2019-15800" }, { "db": "CNNVD", "id": "CNNVD-201911-992" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41672" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "date": "2019-11-14T21:15:11.687000", "db": "NVD", "id": "CVE-2019-15800" }, { "date": "2019-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-992" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41672" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012183" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2019-15800" }, { "date": "2020-09-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-992" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-992" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel GS1900 Vulnerability related to input validation in device firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012183" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-992" } ], "trust": 0.6 } }
var-202112-2079
Vulnerability from variot
A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device. (DoS) It may be in a state. Zyxel ZyXEL GS1900 is a managed switch from Zyxel, Taiwan.
An access control error vulnerability exists in several Zyxel products. The vulnerability is caused by the product's TFTP client not adding permission control to the function of executing system commands. An attacker can use this vulnerability to execute arbitrary operating system commands after logging in
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-2079", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs1900-48", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahn.0\\)-20211208" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aaho.0\\)-20211208" }, { "model": "gs1900-48hpv2", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(abtq.0\\)-20211208" }, { "model": "gs1900-24e", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahk.0\\)-20211208" }, { "model": "gs1900-24ep", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(abto.0\\)-20211208" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aazi.0\\)-20211208" }, { "model": "gs1900-8", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahh.0\\)-20211208" }, { "model": "xgs1210-12", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "1.00\\(abty.5\\)c0" }, { "model": "xgs1250-12", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "1.00\\(abwe.1\\)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahm.0\\)-20211208" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahi.0\\)-20211208" }, { "model": "gs1900-24hpv2", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aatp.0\\)-20211208" }, { "model": "gs1900-24", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahl.0\\)-20211208" }, { "model": "gs1900-16", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahj.0\\)-20211208" }, { "model": "gs1900-24hpv2", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24ep", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-48", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-16", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-10hp", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24hp", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8hp", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24e", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "xgs1250", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "xgs1210", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-01689" }, { "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "db": "NVD", "id": "CVE-2021-35031" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahh.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahi.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aazi.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahj.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahk.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(abto.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahl.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahm.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aatp.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahn.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aaho.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(abtq.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:xgs1210-12_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.00\\(abty.5\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:xgs1210-12:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:xgs1250-12_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.00\\(abwe.1\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:xgs1250-12:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-35031" } ] }, "cve": "CVE-2021-35031", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 5.1, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.7, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-35031", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "MULTIPLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.1, "id": "CNVD-2022-01689", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:M/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.1, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "security@zyxel.com.tw", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-35031", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-35031", "trust": 1.8, "value": "HIGH" }, { "author": "security@zyxel.com.tw", "id": "CVE-2021-35031", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-01689", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-2730", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-35031", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-01689" }, { "db": "VULMON", "id": "CVE-2021-35031" }, { "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "db": "NVD", "id": "CVE-2021-35031" }, { "db": "NVD", "id": "CVE-2021-35031" }, { "db": "CNNVD", "id": "CNNVD-202112-2730" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device. (DoS) It may be in a state. Zyxel ZyXEL GS1900 is a managed switch from Zyxel, Taiwan. \n\r\n\r\nAn access control error vulnerability exists in several Zyxel products. The vulnerability is caused by the product\u0027s TFTP client not adding permission control to the function of executing system commands. An attacker can use this vulnerability to execute arbitrary operating system commands after logging in", "sources": [ { "db": "NVD", "id": "CVE-2021-35031" }, { "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "db": "CNVD", "id": "CNVD-2022-01689" }, { "db": "VULMON", "id": "CVE-2021-35031" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-35031", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017333", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-01689", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022010304", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202112-2730", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-35031", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-01689" }, { "db": "VULMON", "id": "CVE-2021-35031" }, { "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "db": "NVD", "id": "CVE-2021-35031" }, { "db": "CNNVD", "id": "CNNVD-202112-2730" } ] }, "id": "VAR-202112-2079", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-01689" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-01689" } ] }, "last_update_date": "2023-12-18T13:37:09.887000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel\u00a0security\u00a0advisory\u00a0for\u00a0OS\u00a0command\u00a0injection\u00a0vulnerabilities\u00a0of\u00a0GS1900,\u00a0XGS1210,\u00a0and\u00a0XGS1250\u00a0series\u00a0switches", "trust": 0.8, "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerabilities-of-gs1900-xgs1210-and-xgs1250-series-switches" }, { "title": "Patch for ZyXEL GS1900 Access Control Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/312051" }, { "title": "ZyXEL GS1900 Fixes for operating system command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176845" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-01689" }, { "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "db": "CNNVD", "id": "CNNVD-202112-2730" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.0 }, { "problemtype": "OS Command injection (CWE-78) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "db": "NVD", "id": "CVE-2021-35031" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-35031" }, { "trust": 1.7, "url": "https://www.zyxel.com/support/zyxel_security_advisory_for_os_command_injection_vulnerabilities_of_switches.shtml" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022010304" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-01689" }, { "db": "VULMON", "id": "CVE-2021-35031" }, { "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "db": "NVD", "id": "CVE-2021-35031" }, { "db": "CNNVD", "id": "CNNVD-202112-2730" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-01689" }, { "db": "VULMON", "id": "CVE-2021-35031" }, { "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "db": "NVD", "id": "CVE-2021-35031" }, { "db": "CNNVD", "id": "CNNVD-202112-2730" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-31T00:00:00", "db": "CNVD", "id": "CNVD-2022-01689" }, { "date": "2021-12-28T00:00:00", "db": "VULMON", "id": "CVE-2021-35031" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "date": "2021-12-28T11:15:07.463000", "db": "NVD", "id": "CVE-2021-35031" }, { "date": "2021-12-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-2730" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-07T00:00:00", "db": "CNVD", "id": "CNVD-2022-01689" }, { "date": "2022-01-07T00:00:00", "db": "VULMON", "id": "CVE-2021-35031" }, { "date": "2023-01-17T01:51:00", "db": "JVNDB", "id": "JVNDB-2021-017333" }, { "date": "2022-01-07T16:59:51.267000", "db": "NVD", "id": "CVE-2021-35031" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-2730" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-2730" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Zyxel\u00a0 in the firmware \u00a0OS\u00a0 Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017333" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-2730" } ], "trust": 0.6 } }
var-201709-0027
Vulnerability from variot
ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. ZyXEL Access Point NWA1100-N is a wireless network receiving device from ZyXEL Technology. Multiple ZyXEL Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0027", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "c1000z", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "p8702n", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "q1000", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "fr1000z", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "sbg3300-n000", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "sbg3500-n000", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "sbg3300-nb00", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "nwa1100-nh", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "p-660hn-51", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "vsg1435-b101", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "nwa1121-ni", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30a", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ac", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "nwa1100-n", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "vmg8324-b10a", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b10a", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b30a", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "vmg4380-b10a", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ni", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "p-663hn-51", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30b", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b10a", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": null }, { "model": "access point nwa1100-n", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "access point nwa1100-nh", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "access point nwa1123-ac", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "access point nwa1121-ni", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe p-660hn-51", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe p-663hn-51", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe vmg1312-b10a", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe vmg1312-b30a", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe vmg1312-b30b", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe vmg4380-b10a", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe vmg8324-b10a", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe vmg8924-b10a", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe vmg8924-b30a", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "dsl cpe vsg1435-b101", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "gpon pmg1006-b20a", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "gpon pmg5318-b20a", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "small business gateway sbg3300-n000", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "small business gateway sbg3300-nb00", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "small business gateway sbg3500-n000", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "switch gs1900-8", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "switch gs1900-24", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "wimax max208m2w", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "wimax max218m2w", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "wimax max218mw", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "wimax max308m", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "project model c1000z", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "project model q1000", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "project model fr1000z", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": "project model p8702n", "scope": null, "trust": 0.9, "vendor": "zyxel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "actiontec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "general electric", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netcomm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sierra", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubiquiti", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "unify", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zte", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "c1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "fr1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-nh", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1121-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ac", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-663hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p8702n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "q1000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-nb00", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3500-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30b", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg4380-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8324-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vsg1435-b101", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-08082" }, { "db": "BID", "id": "78214" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7256" }, { "db": "CNNVD", "id": "CNNVD-201512-204" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nwa1100-n_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nwa1100-n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nwa1100-nh_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nwa1100-nh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nwa1121-ni_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nwa1121-ni:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nwa1123-ac_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nwa1123-ac:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nwa1123-ni_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nwa1123-ni:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:p-660hn-51_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:p-660hn-51:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:p-663hn-51_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:p-663hn-51:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:vmg1312-b30a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:vmg1312-b30a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:vmg1312-b30b_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:vmg1312-b30b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:vmg8924-b30a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:vmg8924-b30a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:vsg1435-b101_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:vsg1435-b101:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:pmg5318-b20a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:sbg3500-n000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:c1000z_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:c1000z:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:q1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:q1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:fr1000z_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:fr1000z:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:p8702n_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:p8702n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-7256" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stefan Viehb?ck of SEC Consult.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-204" } ], "trust": 0.6 }, "cve": "CVE-2015-7256", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-7256", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-08082", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-85217", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-7256", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-08082", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201512-204", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-85217", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08082" }, { "db": "VULHUB", "id": "VHN-85217" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7256" }, { "db": "CNNVD", "id": "CNNVD-201512-204" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehb\u0026#246;ck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. ZyXEL Access Point NWA1100-N is a wireless network receiving device from ZyXEL Technology. Multiple ZyXEL Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks", "sources": [ { "db": "NVD", "id": "CVE-2015-7256" }, { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "CNVD", "id": "CNVD-2015-08082" }, { "db": "BID", "id": "78214" }, { "db": "VULHUB", "id": "VHN-85217" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#566724", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2015-7256", "trust": 3.4 }, { "db": "BID", "id": "78214", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU96100360", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006907", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201512-204", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-08082", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-85217", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-08082" }, { "db": "VULHUB", "id": "VHN-85217" }, { "db": "BID", "id": "78214" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7256" }, { "db": "CNNVD", "id": "CNNVD-201512-204" } ] }, "id": "VAR-201709-0027", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-08082" }, { "db": "VULHUB", "id": "VHN-85217" } ], "trust": 1.4433235866666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08082" } ] }, "last_update_date": "2023-12-18T12:57:18.228000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)", "trust": 0.8, "url": "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml" }, { "title": "Patches for multiple ZyXEL product information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/68153" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-08082" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-85217" }, { "db": "NVD", "id": "CVE-2015-7256" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/566724" }, { "trust": 2.0, "url": "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml" }, { "trust": 1.6, "url": "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/78214" }, { "trust": 0.8, "url": "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/certificates.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/ssh_host_keys.html" }, { "trust": 0.8, "url": "https://scans.io/" }, { "trust": 0.8, "url": "https://scans.io/series/ssh-rsa-full-ipv4" }, { "trust": 0.8, "url": "https://scans.io/study/sonar.ssl" }, { "trust": 0.8, "url": "https://censys.io" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96100360/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7256" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6358" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7255" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7276" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8251" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-a2nqyp" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-08082" }, { "db": "VULHUB", "id": "VHN-85217" }, { "db": "BID", "id": "78214" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7256" }, { "db": "CNNVD", "id": "CNNVD-201512-204" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-08082" }, { "db": "VULHUB", "id": "VHN-85217" }, { "db": "BID", "id": "78214" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7256" }, { "db": "CNNVD", "id": "CNNVD-201512-204" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-25T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2015-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2015-08082" }, { "date": "2017-09-28T00:00:00", "db": "VULHUB", "id": "VHN-85217" }, { "date": "2015-11-25T00:00:00", "db": "BID", "id": "78214" }, { "date": "2016-02-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-09-28T01:29:00.670000", "db": "NVD", "id": "CVE-2015-7256" }, { "date": "2015-11-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-204" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-06T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2015-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2015-08082" }, { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-85217" }, { "date": "2015-11-25T00:00:00", "db": "BID", "id": "78214" }, { "date": "2018-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-10-11T17:59:55.210000", "db": "NVD", "id": "CVE-2015-7256" }, { "date": "2015-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-204" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-204" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedded devices use non-unique X.509 certificates and SSH host keys", "sources": [ { "db": "CERT/CC", "id": "VU#566724" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-204" } ], "trust": 0.6 } }
var-202112-2078
Vulnerability from variot
A vulnerability in the 'libsal.so' of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call. (DoS) It may be in a state. Zyxel ZyXEL GS1900 is a managed switch from Zyxel in Taiwan
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-2078", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs1900-48", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahn.0\\)-20211208" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aaho.0\\)-20211208" }, { "model": "gs1900-48hpv2", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(abtq.0\\)-20211208" }, { "model": "gs1900-24e", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahk.0\\)-20211208" }, { "model": "gs1900-24ep", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(abto.0\\)-20211208" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aazi.0\\)-20211208" }, { "model": "gs1900-8", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahh.0\\)-20211208" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahm.0\\)-20211208" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahi.0\\)-20211208" }, { "model": "gs1900-24hpv2", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aatp.0\\)-20211208" }, { "model": "gs1900-24", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahl.0\\)-20211208" }, { "model": "gs1900-16", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.70\\(aahj.0\\)-20211208" }, { "model": "gs1900-24hpv2", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24ep", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-48", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-16", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-10hp", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24hp", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8hp", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24e", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.60" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-09789" }, { "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "db": "NVD", "id": "CVE-2021-35032" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahh.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahi.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aazi.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahj.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahk.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(abto.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahl.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahm.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aatp.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aahn.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(aaho.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.70\\(abtq.0\\)-20211208", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-35032" } ] }, "cve": "CVE-2021-35032", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-35032", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2022-09789", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "security@zyxel.com.tw", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.5, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-35032", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-35032", "trust": 1.8, "value": "HIGH" }, { "author": "security@zyxel.com.tw", "id": "CVE-2021-35032", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-09789", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-2727", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-35032", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-09789" }, { "db": "VULMON", "id": "CVE-2021-35032" }, { "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "db": "NVD", "id": "CVE-2021-35032" }, { "db": "NVD", "id": "CVE-2021-35032" }, { "db": "CNNVD", "id": "CNNVD-202112-2727" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the \u0027libsal.so\u0027 of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call. (DoS) It may be in a state. Zyxel ZyXEL GS1900 is a managed switch from Zyxel in Taiwan", "sources": [ { "db": "NVD", "id": "CVE-2021-35032" }, { "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "db": "CNVD", "id": "CNVD-2022-09789" }, { "db": "VULMON", "id": "CVE-2021-35032" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-35032", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017331", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-09789", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022010304", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202112-2727", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-35032", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-09789" }, { "db": "VULMON", "id": "CVE-2021-35032" }, { "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "db": "NVD", "id": "CVE-2021-35032" }, { "db": "CNNVD", "id": "CNNVD-202112-2727" } ] }, "id": "VAR-202112-2078", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-09789" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-09789" } ] }, "last_update_date": "2023-12-18T13:37:09.916000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel\u00a0security\u00a0advisory\u00a0for\u00a0OS\u00a0command\u00a0injection\u00a0vulnerabilities\u00a0of\u00a0GS1900,\u00a0XGS1210,\u00a0and\u00a0XGS1250\u00a0series\u00a0switches", "trust": 0.8, "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerabilities-of-gs1900-xgs1210-and-xgs1250-series-switches" }, { "title": "Patch for Zyxel GS1900 Operating System Command Injection Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/318816" }, { "title": "Zyxel GS1900 Fixes for operating system command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176844" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-09789" }, { "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "db": "CNNVD", "id": "CNNVD-202112-2727" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.0 }, { "problemtype": "OS Command injection (CWE-78) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "db": "NVD", "id": "CVE-2021-35032" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-35032" }, { "trust": 1.7, "url": "https://www.zyxel.com/support/zyxel_security_advisory_for_os_command_injection_vulnerabilities_of_switches.shtml" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022010304" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-09789" }, { "db": "VULMON", "id": "CVE-2021-35032" }, { "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "db": "NVD", "id": "CVE-2021-35032" }, { "db": "CNNVD", "id": "CNNVD-202112-2727" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-09789" }, { "db": "VULMON", "id": "CVE-2021-35032" }, { "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "db": "NVD", "id": "CVE-2021-35032" }, { "db": "CNNVD", "id": "CNNVD-202112-2727" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-09789" }, { "date": "2021-12-28T00:00:00", "db": "VULMON", "id": "CVE-2021-35032" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "date": "2021-12-28T11:15:07.583000", "db": "NVD", "id": "CVE-2021-35032" }, { "date": "2021-12-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-2727" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-12T00:00:00", "db": "CNVD", "id": "CNVD-2022-09789" }, { "date": "2022-01-07T00:00:00", "db": "VULMON", "id": "CVE-2021-35032" }, { "date": "2023-01-17T01:33:00", "db": "JVNDB", "id": "JVNDB-2021-017331" }, { "date": "2022-01-07T17:01:25.907000", "db": "NVD", "id": "CVE-2021-35032" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-2727" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-2727" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel GS1900 Operating System Command Injection Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2022-09789" }, { "db": "CNNVD", "id": "CNNVD-202112-2727" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-2727" } ], "trust": 0.6 } }
var-201911-1540
Vulnerability from variot
Technicolor C2000T and C2100T uses hard-coded cryptographic keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1540", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "c2100t", "scope": "eq", "trust": 2.2, "vendor": "technicolor", "version": null }, { "model": "c2000t", "scope": "eq", "trust": 2.2, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "actiontec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "general electric", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netcomm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sierra", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubiquiti", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "unify", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zte", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "c1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "fr1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-nh", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1121-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ac", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-663hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p8702n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "q1000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-nb00", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3500-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30b", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg4380-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8324-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vsg1435-b101", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7276" }, { "db": "CNNVD", "id": "CNNVD-201911-301" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:technicolor:c2000t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:technicolor:c2000t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:technicolor:c2100t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:technicolor:c2100t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-7276" } ] }, "cve": "CVE-2015-7276", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-7276", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-7276", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201911-301", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7276" }, { "db": "CNNVD", "id": "CNNVD-201911-301" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Technicolor C2000T and C2100T uses hard-coded cryptographic keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehb\u0026#246;ck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked", "sources": [ { "db": "NVD", "id": "CVE-2015-7276" }, { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#566724", "trust": 3.2 }, { "db": "NVD", "id": "CVE-2015-7276", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96100360", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006907", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201911-301", "trust": 0.6 } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7276" }, { "db": "CNNVD", "id": "CNNVD-201911-301" } ] }, "id": "VAR-201911-1540", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5497076 }, "last_update_date": "2023-12-18T12:57:18.203000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)", "trust": 0.8, "url": "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006907" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2015-7276" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.kb.cert.org/vuls/id/566724" }, { "trust": 1.6, "url": "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7276" }, { "trust": 1.0, "url": "https://sec-consult.com/en/blog/2015/11/house-of-keys-industry-wide-https/" }, { "trust": 0.8, "url": "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/certificates.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/ssh_host_keys.html" }, { "trust": 0.8, "url": "https://scans.io/" }, { "trust": 0.8, "url": "https://scans.io/series/ssh-rsa-full-ipv4" }, { "trust": 0.8, "url": "https://scans.io/study/sonar.ssl" }, { "trust": 0.8, "url": "https://censys.io" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96100360/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7256" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6358" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7255" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8251" }, { "trust": 0.6, "url": "https/" }, { "trust": 0.6, "url": "https://sec-consult.com/en/blog/2015/11/house-of-keys-industry-wide-" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7276" }, { "db": "CNNVD", "id": "CNNVD-201911-301" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7276" }, { "db": "CNNVD", "id": "CNNVD-201911-301" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-25T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2016-02-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2019-11-06T16:15:10.447000", "db": "NVD", "id": "CVE-2015-7276" }, { "date": "2019-11-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-301" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-06T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2018-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2019-11-08T19:42:59.110000", "db": "NVD", "id": "CVE-2015-7276" }, { "date": "2019-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-301" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-301" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedded devices use non-unique X.509 certificates and SSH host keys", "sources": [ { "db": "CERT/CC", "id": "VU#566724" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-301" } ], "trust": 0.6 } }
var-201911-1315
Vulnerability from variot
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return TRUE with no actual checks performed. The diagnostics menu allows for reading/writing arbitrary registers and various other configuration parameters which are believed to be related to the network interface chips. Zyxel GS1900 There is an input validation vulnerability in the device firmware.Information may be obtained and information may be altered. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan.
A security hole exists in the Zyxel GS1900 using firmware 2.50 (AAHH.0) prior to C0. An attacker could exploit this vulnerability to access restricted features
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1315", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aazi.0\\)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahk.0\\)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahj.0\\)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahi.0\\)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aaho.0\\)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahm.0\\)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahh.0\\)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahn.0\\)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahl.0\\)c0" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900 \u003c2.50 c0", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41669" }, { "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "db": "NVD", "id": "CVE-2019-15803" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-15803" } ] }, "cve": "CVE-2019-15803", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-15803", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-41669", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-15803", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-15803", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-41669", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201911-995", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41669" }, { "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "db": "NVD", "id": "CVE-2019-15803" }, { "db": "CNNVD", "id": "CNNVD-201911-995" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return TRUE with no actual checks performed. The diagnostics menu allows for reading/writing arbitrary registers and various other configuration parameters which are believed to be related to the network interface chips. Zyxel GS1900 There is an input validation vulnerability in the device firmware.Information may be obtained and information may be altered. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan. \n\nA security hole exists in the Zyxel GS1900 using firmware 2.50 (AAHH.0) prior to C0. An attacker could exploit this vulnerability to access restricted features", "sources": [ { "db": "NVD", "id": "CVE-2019-15803" }, { "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "db": "CNVD", "id": "CNVD-2019-41669" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-15803", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-012185", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-41669", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-995", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41669" }, { "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "db": "NVD", "id": "CVE-2019-15803" }, { "db": "CNNVD", "id": "CNNVD-201911-995" } ] }, "id": "VAR-201911-1315", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-41669" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41669" } ] }, "last_update_date": "2023-12-18T11:59:12.019000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel security advisory for GS1900 switch vulnerabilities", "trust": 0.8, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "title": "Patch for Unknown vulnerability in ZyXEL GS1900 (CNVD-2019-41669)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/191507" }, { "title": "ZyXEL GS1900 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=103377" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41669" }, { "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "db": "CNNVD", "id": "CNNVD-201911-995" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "db": "NVD", "id": "CVE-2019-15803" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15803" }, { "trust": 1.6, "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "trust": 1.6, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15803" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41669" }, { "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "db": "NVD", "id": "CVE-2019-15803" }, { "db": "CNNVD", "id": "CNNVD-201911-995" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-41669" }, { "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "db": "NVD", "id": "CVE-2019-15803" }, { "db": "CNNVD", "id": "CNNVD-201911-995" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41669" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "date": "2019-11-14T21:15:11.890000", "db": "NVD", "id": "CVE-2019-15803" }, { "date": "2019-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-995" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41669" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012185" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2019-15803" }, { "date": "2020-09-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-995" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-995" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel GS1900 Vulnerability related to input validation in device firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012185" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-995" } ], "trust": 0.6 } }
var-201708-0143
Vulnerability from variot
ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, ZXHN H108N use non-unique X.509 certificates and SSH host keys, which might allow remote attackers to obtain credentials or other sensitive information via a man-in-the-middle attack, passive decryption attack, or impersonating a legitimate device. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. As a result, confidential information may be leaked. ZTEOX-330P and others are wireless router products of China ZTE Corporation (ZTE). An information disclosure vulnerability exists in several ZTE products. The following products are affected: ZTE OX-330P; ZXHN H108N; W300V1.0.0S_ZRD_TR1_D68; HG110; GAN9.8T101A-B; MF28G;
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-0143", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ox-330p", "scope": "eq", "trust": 1.6, "vendor": "zte", "version": null }, { "model": "zxhn h108n", "scope": "eq", "trust": 1.6, "vendor": "zte", "version": null }, { "model": "hg110", "scope": "eq", "trust": 1.6, "vendor": "zte", "version": null }, { "model": "gan9.8t101a-b", "scope": "eq", "trust": 1.6, "vendor": "zte", "version": null }, { "model": "mf28g", "scope": "eq", "trust": 1.6, "vendor": "zte", "version": null }, { "model": "w300v1.0.0s zrd tr1 d68", "scope": "eq", "trust": 1.6, "vendor": "zte", "version": null }, { "model": "zxhn h108n", "scope": null, "trust": 1.2, "vendor": "zte", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "actiontec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "general electric", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netcomm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sierra", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubiquiti", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "unify", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zte", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "c1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "fr1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-nh", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1121-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ac", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-663hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p8702n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "q1000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-nb00", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3500-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30b", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg4380-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8324-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vsg1435-b101", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null }, { "model": "ox-330p", "scope": null, "trust": 0.6, "vendor": "zte", "version": null }, { "model": "w300v1.0.0s zrd tr1 d68", "scope": null, "trust": 0.6, "vendor": "zte", "version": null }, { "model": "hg110", "scope": null, "trust": 0.6, "vendor": "zte", "version": null }, { "model": "gan9.8t101a-b", "scope": null, "trust": 0.6, "vendor": "zte", "version": null }, { "model": "mf28g", "scope": null, "trust": 0.6, "vendor": "zte", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2017-33516" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7255" }, { "db": "CNNVD", "id": "CNNVD-201708-1334" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zte:ox-330p_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zte:ox-330p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zte:zxhn_h108n_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zte:zxhn_h108n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zte:w300v1.0.0s_zrd_tr1_d68_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zte:w300v1.0.0s_zrd_tr1_d68:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zte:hg110_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zte:hg110:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zte:gan9.8t101a-b_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zte:gan9.8t101a-b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zte:mf28g_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zte:mf28g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zte:zxhn_h108n_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zte:zxhn_h108n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-7255" } ] }, "cve": "CVE-2015-7255", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-7255", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2017-33516", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-85216", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-7255", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-7255", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-33516", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201708-1334", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-85216", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33516" }, { "db": "VULHUB", "id": "VHN-85216" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7255" }, { "db": "CNNVD", "id": "CNNVD-201708-1334" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, ZXHN H108N use non-unique X.509 certificates and SSH host keys, which might allow remote attackers to obtain credentials or other sensitive information via a man-in-the-middle attack, passive decryption attack, or impersonating a legitimate device. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehb\u0026#246;ck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. As a result, confidential information may be leaked. ZTEOX-330P and others are wireless router products of China ZTE Corporation (ZTE). An information disclosure vulnerability exists in several ZTE products. The following products are affected: ZTE OX-330P; ZXHN H108N; W300V1.0.0S_ZRD_TR1_D68; HG110; GAN9.8T101A-B; MF28G;", "sources": [ { "db": "NVD", "id": "CVE-2015-7255" }, { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "CNVD", "id": "CNVD-2017-33516" }, { "db": "VULHUB", "id": "VHN-85216" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#566724", "trust": 3.9 }, { "db": "NVD", "id": "CVE-2015-7255", "trust": 3.1 }, { "db": "JVN", "id": "JVNVU96100360", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006907", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201708-1334", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-33516", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-85216", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2017-33516" }, { "db": "VULHUB", "id": "VHN-85216" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7255" }, { "db": "CNNVD", "id": "CNNVD-201708-1334" } ] }, "id": "VAR-201708-0143", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-33516" }, { "db": "VULHUB", "id": "VHN-85216" } ], "trust": 1.2870330757142856 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33516" } ] }, "last_update_date": "2023-12-18T12:57:18.133000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)", "trust": 0.8, "url": "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006907" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-85216" }, { "db": "NVD", "id": "CVE-2015-7255" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.kb.cert.org/vuls/id/566724" }, { "trust": 1.7, "url": "https://www.kb.cert.org/vuls/id/bluu-a2nqyr" }, { "trust": 1.6, "url": "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html" }, { "trust": 1.6, "url": "https://github.com/sec-consult/houseofkeys/search?p=3\u0026q=zte\u0026type=\u0026utf8=%e2%9c%93" }, { "trust": 0.8, "url": "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/certificates.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/ssh_host_keys.html" }, { "trust": 0.8, "url": "https://scans.io/" }, { "trust": 0.8, "url": "https://scans.io/series/ssh-rsa-full-ipv4" }, { "trust": 0.8, "url": "https://scans.io/study/sonar.ssl" }, { "trust": 0.8, "url": "https://censys.io" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96100360/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7256" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6358" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7255" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7276" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8251" }, { "trust": 0.1, "url": "https://github.com/sec-consult/houseofkeys/search?p=3\u0026amp;q=zte\u0026amp;type=\u0026amp;utf8=%e2%9c%93" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2017-33516" }, { "db": "VULHUB", "id": "VHN-85216" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7255" }, { "db": "CNNVD", "id": "CNNVD-201708-1334" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2017-33516" }, { "db": "VULHUB", "id": "VHN-85216" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-7255" }, { "db": "CNNVD", "id": "CNNVD-201708-1334" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-25T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2017-11-10T00:00:00", "db": "CNVD", "id": "CNVD-2017-33516" }, { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-85216" }, { "date": "2016-02-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-08-29T15:29:00.517000", "db": "NVD", "id": "CVE-2015-7255" }, { "date": "2017-08-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201708-1334" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-06T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2017-11-10T00:00:00", "db": "CNVD", "id": "CNVD-2017-33516" }, { "date": "2017-09-12T00:00:00", "db": "VULHUB", "id": "VHN-85216" }, { "date": "2018-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-09-12T15:56:48.910000", "db": "NVD", "id": "CVE-2015-7255" }, { "date": "2017-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201708-1334" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201708-1334" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedded devices use non-unique X.509 certificates and SSH host keys", "sources": [ { "db": "CERT/CC", "id": "VU#566724" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201708-1334" } ], "trust": 0.6 } }
var-201710-0035
Vulnerability from variot
Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. The Cisco RV320 Dual Gigabit WAN VPN is a router product from Cisco Systems, USA. Multiple Cisco Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks. This issue is being tracked by Cisco Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The flaw stems from the fact that the program does not generate unique keys and certificates
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0035", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wap4410n", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.7.8" }, { "model": "srp520-u", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.2.6" }, { "model": "wap2000", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.8.0" }, { "model": "wvc2300", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.1.2.6" }, { "model": "rv315w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.01.03" }, { "model": "wap4400n", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "srp520", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.01.29" }, { "model": "rtp300", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "3.1.24" }, { "model": "rv180w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.4" }, { "model": "wrvs4400n", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.2.2" }, { "model": "wap200", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.6.0" }, { "model": "rvs4000", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.3.4" }, { "model": "wrv210", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.1.5" }, { "model": "wrp500", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.1.002" }, { "model": "rv325", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.10" }, { "model": "wrv200", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.39" }, { "model": "rv180", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.4" }, { "model": "wet200", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.8.0" }, { "model": "rv120w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.9" }, { "model": "spa400", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.1.2.2" }, { "model": "pvc2300", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.1.2.6" }, { "model": "srw224p", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.2.4" }, { "model": "rv220w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.4.17" }, { "model": "rv320", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.10" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "actiontec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "general electric", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netcomm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sierra", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubiquiti", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "unify", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zte", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "c1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "fr1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-nh", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1121-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ac", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-663hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p8702n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "q1000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-nb00", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3500-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30b", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg4380-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8324-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vsg1435-b101", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null }, { "model": "rv320 dual gigabit wan vpn router", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv325 dual gigabit wan vpn router", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv325 dual wan gigabit vpn router", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rvs4000 4-port gigabit security router vpn", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wrv210 wireless-g vpn router rangebooster", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wap4410n wireless-n access point poe/advanced security", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wrv200 wireless-g vpn router rangebooster", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wrvs4400n wireless", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "srw224p", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.2.4" }, { "model": "wap4400n", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wvc2300", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.1.2.6" }, { "model": "rv180", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.5.4" }, { "model": "wap200", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.6.0" }, { "model": "wrvs4400n", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.2.2" }, { "model": "rv180w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.5.4" }, { "model": "wap2000", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.8.0" }, { "model": "pvc2300", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.1.2.6" }, { "model": "wet200", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.8.0" }, { "model": "wvc2300 wireless-g business internet video camera audio", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wrvs4400n wireless-n gigabit security router vpn", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-2.0" }, { "model": "wrv210 wireless-g vpn router rangebooster", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wrv200 wireless-g vpn router rangebooster", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wrp500 wireless-ac broadband router with phone ports", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20" }, { "model": "wet200 wireless-g business ethernet bridge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "wap4410n wireless-n access point poe/advanced security", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wap4400n wireless-n access point poe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wap2000 wireless-g access point poe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wap200 wireless-g access point poe/rangebooster", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "srw224p 24-port 2-port gigabit switch webview/poe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10/100+-0" }, { "model": "spa400 internet telephony gateway with fxo ports", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40" }, { "model": "small business srp520-u models", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "small business srp520 models", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rvs4000 4-port gigabit security router vpn", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "rv325 dual wan gigabit vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv325 dual gigabit wan vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv320 dual gigabit wan vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv315w wireless-n vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv220w wireless network security firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv180w wireless-n multifunction vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv180 vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv120w wireless-n vpn firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rtp300 broadband router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "pvc2300 business internet video camera audio/poe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "BID", "id": "78047" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.3.1.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.3.1.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.3.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wrv210_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.1.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wrv210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.7.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wrv200_firmware:1.0.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wrv200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wrvs4400n_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.2.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wap200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wap200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wvc2300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.1.2.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wvc2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:pvc2300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.1.2.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:pvc2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:srw224p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.2.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:srw224p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wet200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.8.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wet200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wap2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.8.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wap2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wap4400n_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "-", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wap4400n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.9", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv180w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv315w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.01.03", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv315w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:srp520_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.01.29", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:srp520:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:srp520-u_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.2.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:srp520-u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wrp500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.1.002", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wrp500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa400_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.1.2.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rtp300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.1.24", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rtp300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.4.17", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6358" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stefan Viehb\u00f6ck of SEC Consult.", "sources": [ { "db": "BID", "id": "78047" } ], "trust": 0.3 }, "cve": "CVE-2015-6358", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-6358", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-07863", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-84319", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6358", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-07863", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201511-426", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-84319", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehb\u0026#246;ck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. The Cisco RV320 Dual Gigabit WAN VPN is a router product from Cisco Systems, USA. Multiple Cisco Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks. \nThis issue is being tracked by Cisco Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The flaw stems from the fact that the program does not generate unique keys and certificates", "sources": [ { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "BID", "id": "78047" }, { "db": "VULHUB", "id": "VHN-84319" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#566724", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2015-6358", "trust": 3.4 }, { "db": "BID", "id": "78047", "trust": 2.0 }, { "db": "SECTRACK", "id": "1034257", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034255", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034258", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034256", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU96100360", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006907", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-426", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07863", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-84319", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" }, { "db": "BID", "id": "78047" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "id": "VAR-201710-0035", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" } ], "trust": 1.3657509969230768 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07863" } ] }, "last_update_date": "2023-12-18T12:57:18.166000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)", "trust": 0.8, "url": "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml" }, { "title": "Patches for multiple Cisco product information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/67387" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-295", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84319" }, { "db": "NVD", "id": "CVE-2015-6358" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/566724" }, { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151125-ci" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/78047" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034255" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034256" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034257" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034258" }, { "trust": 1.6, "url": "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html" }, { "trust": 0.8, "url": "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/certificates.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/ssh_host_keys.html" }, { "trust": 0.8, "url": "https://scans.io/" }, { "trust": 0.8, "url": "https://scans.io/series/ssh-rsa-full-ipv4" }, { "trust": 0.8, "url": "https://scans.io/study/sonar.ssl" }, { "trust": 0.8, "url": "https://censys.io" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96100360/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7256" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6358" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7255" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7276" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8251" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-a2nqxj" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" }, { "db": "BID", "id": "78047" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" }, { "db": "BID", "id": "78047" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-25T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2015-12-01T00:00:00", "db": "CNVD", "id": "CNVD-2015-07863" }, { "date": "2017-10-12T00:00:00", "db": "VULHUB", "id": "VHN-84319" }, { "date": "2015-11-25T00:00:00", "db": "BID", "id": "78047" }, { "date": "2016-02-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-10-12T15:29:00.217000", "db": "NVD", "id": "CVE-2015-6358" }, { "date": "2015-11-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-06T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2015-12-01T00:00:00", "db": "CNVD", "id": "CNVD-2015-07863" }, { "date": "2017-11-03T00:00:00", "db": "VULHUB", "id": "VHN-84319" }, { "date": "2015-11-25T00:00:00", "db": "BID", "id": "78047" }, { "date": "2018-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-11-03T16:46:26.840000", "db": "NVD", "id": "CVE-2015-6358" }, { "date": "2017-10-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-426" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedded devices use non-unique X.509 certificates and SSH host keys", "sources": [ { "db": "CERT/CC", "id": "VU#566724" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-426" } ], "trust": 0.6 } }
var-201911-1316
Vulnerability from variot
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console. Zyxel GS1900 An input validation vulnerability exists in the device firmware.Information may be altered. ZyXEL GS1900 is a managed switch of ZyXEL Corporation in Taiwan.
There is a security vulnerability in Zyxel GS1900 using firmware versions prior to 2.50 (AAHH.0) C0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1316", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aazi.0\\)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahk.0\\)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahj.0\\)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahi.0\\)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aaho.0\\)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahm.0\\)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahh.0\\)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahn.0\\)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahl.0\\)c0" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900 \u003c2.50 c0", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28447" }, { "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "db": "NVD", "id": "CVE-2019-15804" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-15804" } ] }, "cve": "CVE-2019-15804", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-15804", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-28447", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-15804", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-15804", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2020-28447", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201911-996", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28447" }, { "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "db": "NVD", "id": "CVE-2019-15804" }, { "db": "CNNVD", "id": "CNNVD-201911-996" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains \"Password recovery for specific user\" options. The menu is believed to be accessible using a serial console. Zyxel GS1900 An input validation vulnerability exists in the device firmware.Information may be altered. ZyXEL GS1900 is a managed switch of ZyXEL Corporation in Taiwan. \n\r\n\r\nThere is a security vulnerability in Zyxel GS1900 using firmware versions prior to 2.50 (AAHH.0) C0", "sources": [ { "db": "NVD", "id": "CVE-2019-15804" }, { "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "db": "CNVD", "id": "CNVD-2020-28447" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-15804", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-012186", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-28447", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-996", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28447" }, { "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "db": "NVD", "id": "CVE-2019-15804" }, { "db": "CNNVD", "id": "CNNVD-201911-996" } ] }, "id": "VAR-201911-1316", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-28447" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28447" } ] }, "last_update_date": "2023-12-18T13:07:48.917000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel security advisory for GS1900 switch vulnerabilities", "trust": 0.8, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "title": "Patch for ZyXEL GS1900 input verification error vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/217693" }, { "title": "ZyXEL GS1900 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=103378" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28447" }, { "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "db": "CNNVD", "id": "CNNVD-201911-996" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "db": "NVD", "id": "CVE-2019-15804" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15804" }, { "trust": 1.6, "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "trust": 1.6, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15804" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28447" }, { "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "db": "NVD", "id": "CVE-2019-15804" }, { "db": "CNNVD", "id": "CNNVD-201911-996" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-28447" }, { "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "db": "NVD", "id": "CVE-2019-15804" }, { "db": "CNNVD", "id": "CNNVD-201911-996" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-15T00:00:00", "db": "CNVD", "id": "CNVD-2020-28447" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "date": "2019-11-14T21:15:11.953000", "db": "NVD", "id": "CVE-2019-15804" }, { "date": "2019-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-996" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-15T00:00:00", "db": "CNVD", "id": "CNVD-2020-28447" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012186" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2019-15804" }, { "date": "2020-09-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-996" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-996" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel GS1900 Input validation vulnerability in device firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012186" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-996" } ], "trust": 0.6 } }
var-201709-0051
Vulnerability from variot
OpenStage 60 and OpenScape Desk Phone IP 55G SIP V3, OpenStage 15, 20E, 20 and 40 and OpenScape Desk Phone IP 35G SIP V3, OpenScape Desk Phone IP 35G Eco SIP V3, OpenStage 60 and OpenScape Desk Phone IP 55G HFA V3, OpenStage 15, 20E, 20, and 40 and OpenScape Desk Phone IP 35G HFA V3, and OpenScape Desk Phone IP 35G Eco HFA V3 use non-unique X.509 certificates and SSH host keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. UnifyOpenStage60 and so on are all IP phones from Unify. A remote attacker could exploit the vulnerability to exploit a man-in-the-middle attack or decrypt communication between legitimate users and devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openstage 20e", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openscape desk phone ip 35g sip", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openstage 15", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openscape desk phone ip 35g hfa", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openstage 20", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openscape desk phone ip 55g hfa", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openscape desk phone ip 55g sip", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openscape desk phone ip 35g eco sip", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openstage 40", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": "openstage 60", "scope": "eq", "trust": 1.6, "vendor": "unify", "version": "3.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "actiontec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "general electric", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netcomm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sierra", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubiquiti", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "unify", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zte", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "c1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "fr1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-nh", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1121-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ac", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-663hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p8702n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "q1000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-nb00", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3500-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30b", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg4380-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8324-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vsg1435-b101", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null }, { "model": "openstage", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "60" }, { "model": "openscape desk phone ip 55g sip", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "v3" }, { "model": "openscape desk phone ip 35g sip", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "v3" }, { "model": "openstage", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "40" }, { "model": "openstage", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "20" }, { "model": "openstage 20e", "scope": null, "trust": 0.6, "vendor": "unify", "version": null }, { "model": "openstage", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "15" }, { "model": "openscape desk phone ip 55g hfa", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "v3" }, { "model": "openscape desk phone ip 35g hfa", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "v3" }, { "model": "openscape desk phone ip 35g eco hfa", "scope": "eq", "trust": 0.6, "vendor": "unify", "version": "v3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2017-33799" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-8251" }, { "db": "CNNVD", "id": "CNNVD-201709-1157" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openstage_60_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openstage_60:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openscape_desk_phone_ip_55g_sip_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openscape_desk_phone_ip_55g_sip:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openstage_15_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openstage_15:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openstage_20e_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openstage_20e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openstage_20_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openstage_20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openstage_40_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openstage_40:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openscape_desk_phone_ip_35g_sip_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openscape_desk_phone_ip_35g_sip:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openscape_desk_phone_ip_35g_eco_sip_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openscape_desk_phone_ip_35g_eco_sip:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openscape_desk_phone_ip_55g_hfa_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openscape_desk_phone_ip_55g_hfa:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openscape_desk_phone_ip_35g_hfa_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openscape_desk_phone_ip_35g_hfa:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unify:openstage_60_firmware:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:unify:openscape_desk_phone_ip_35g_eco_hfa:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-8251" } ] }, "cve": "CVE-2015-8251", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-8251", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2017-33799", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-86212", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-8251", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2017-33799", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201709-1157", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-86212", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33799" }, { "db": "VULHUB", "id": "VHN-86212" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-8251" }, { "db": "CNNVD", "id": "CNNVD-201709-1157" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenStage 60 and OpenScape Desk Phone IP 55G SIP V3, OpenStage 15, 20E, 20 and 40 and OpenScape Desk Phone IP 35G SIP V3, OpenScape Desk Phone IP 35G Eco SIP V3, OpenStage 60 and OpenScape Desk Phone IP 55G HFA V3, OpenStage 15, 20E, 20, and 40 and OpenScape Desk Phone IP 35G HFA V3, and OpenScape Desk Phone IP 35G Eco HFA V3 use non-unique X.509 certificates and SSH host keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehb\u0026#246;ck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. UnifyOpenStage60 and so on are all IP phones from Unify. A remote attacker could exploit the vulnerability to exploit a man-in-the-middle attack or decrypt communication between legitimate users and devices", "sources": [ { "db": "NVD", "id": "CVE-2015-8251" }, { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "CNVD", "id": "CNVD-2017-33799" }, { "db": "VULHUB", "id": "VHN-86212" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#566724", "trust": 3.9 }, { "db": "NVD", "id": "CVE-2015-8251", "trust": 3.1 }, { "db": "JVN", "id": "JVNVU96100360", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006907", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-1157", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-33799", "trust": 0.6 }, { "db": "BID", "id": "84118", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-86212", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2017-33799" }, { "db": "VULHUB", "id": "VHN-86212" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-8251" }, { "db": "CNNVD", "id": "CNNVD-201709-1157" } ] }, "id": "VAR-201709-0051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-33799" }, { "db": "VULHUB", "id": "VHN-86212" } ], "trust": 1.1312134525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33799" } ] }, "last_update_date": "2023-12-18T12:57:18.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)", "trust": 0.8, "url": "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006907" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86212" }, { "db": "NVD", "id": "CVE-2015-8251" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.kb.cert.org/vuls/id/566724" }, { "trust": 1.7, "url": "https://networks.unify.com/security/advisories/obso-1511-02-a.pdf" }, { "trust": 1.7, "url": "https://networks.unify.com/security/advisories/obso-1511-02.pdf" }, { "trust": 1.7, "url": "https://www.kb.cert.org/vuls/id/bluu-a2ppze" }, { "trust": 1.6, "url": "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html" }, { "trust": 0.8, "url": "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/certificates.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/ssh_host_keys.html" }, { "trust": 0.8, "url": "https://scans.io/" }, { "trust": 0.8, "url": "https://scans.io/series/ssh-rsa-full-ipv4" }, { "trust": 0.8, "url": "https://scans.io/study/sonar.ssl" }, { "trust": 0.8, "url": "https://censys.io" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96100360/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7256" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6358" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7255" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7276" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8251" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2017-33799" }, { "db": "VULHUB", "id": "VHN-86212" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-8251" }, { "db": "CNNVD", "id": "CNNVD-201709-1157" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2017-33799" }, { "db": "VULHUB", "id": "VHN-86212" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-8251" }, { "db": "CNNVD", "id": "CNNVD-201709-1157" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-25T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2017-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2017-33799" }, { "date": "2017-09-25T00:00:00", "db": "VULHUB", "id": "VHN-86212" }, { "date": "2016-02-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-09-25T21:29:00.913000", "db": "NVD", "id": "CVE-2015-8251" }, { "date": "2017-09-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-1157" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-06T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2017-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2017-33799" }, { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-86212" }, { "date": "2018-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-10-11T17:53:34.040000", "db": "NVD", "id": "CVE-2015-8251" }, { "date": "2017-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-1157" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-1157" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedded devices use non-unique X.509 certificates and SSH host keys", "sources": [ { "db": "CERT/CC", "id": "VU#566724" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-1157" } ], "trust": 0.6 } }
var-201911-1313
Vulnerability from variot
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0. Zyxel GS1900 The device firmware contains an information disclosure vulnerability from the cache.Information may be obtained. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan.
A security hole exists in the Zyxel GS1900 using firmware 2.50 (AAHH.0) prior to C0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1313", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs1900-8", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-8hp", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-10hp", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aazi.0\\)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahk.0\\)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahj.0\\)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahi.0\\)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aaho.0\\)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahm.0\\)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahh.0\\)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahn.0\\)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahl.0\\)c0" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900 \u003c2.50 c0", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" }, { "model": "gs1900-16", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "gs1900-8hp", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" }, { "model": "gs1900-10hp", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41671" }, { "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "db": "NVD", "id": "CVE-2019-15801" }, { "db": "CNNVD", "id": "CNNVD-201911-993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-15801" } ] }, "cve": "CVE-2019-15801", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-15801", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-41671", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-15801", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-15801", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-41671", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201911-993", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-15801", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41671" }, { "db": "VULMON", "id": "CVE-2019-15801" }, { "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "db": "NVD", "id": "CVE-2019-15801" }, { "db": "CNNVD", "id": "CNNVD-201911-993" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0. Zyxel GS1900 The device firmware contains an information disclosure vulnerability from the cache.Information may be obtained. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan. \n\nA security hole exists in the Zyxel GS1900 using firmware 2.50 (AAHH.0) prior to C0", "sources": [ { "db": "NVD", "id": "CVE-2019-15801" }, { "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "db": "CNVD", "id": "CNVD-2019-41671" }, { "db": "VULMON", "id": "CVE-2019-15801" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-15801", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-012184", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-41671", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-993", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-15801", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41671" }, { "db": "VULMON", "id": "CVE-2019-15801" }, { "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "db": "NVD", "id": "CVE-2019-15801" }, { "db": "CNNVD", "id": "CNNVD-201911-993" } ] }, "id": "VAR-201911-1313", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-41671" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41671" } ] }, "last_update_date": "2023-12-18T12:49:58.875000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel security advisory for GS1900 switch vulnerabilities", "trust": 0.8, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "title": "Patch for ZyXEL GS1900 uses hardcoded password vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/191497" }, { "title": "ZyXEL GS1900 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=102963" }, { "title": "CVE-2019-15802", "trust": 0.1, "url": "https://github.com/jasperla/cve-2019-15802 " }, { "title": "realtek_turnkey_decrypter", "trust": 0.1, "url": "https://github.com/jasperla/realtek_turnkey_decrypter " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41671" }, { "db": "VULMON", "id": "CVE-2019-15801" }, { "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "db": "CNNVD", "id": "CNNVD-201911-993" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.0 }, { "problemtype": "CWE-522", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "db": "NVD", "id": "CVE-2019-15801" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15801" }, { "trust": 1.7, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "trust": 1.7, "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15801" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/798.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/jasperla/cve-2019-15802" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41671" }, { "db": "VULMON", "id": "CVE-2019-15801" }, { "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "db": "NVD", "id": "CVE-2019-15801" }, { "db": "CNNVD", "id": "CNNVD-201911-993" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-41671" }, { "db": "VULMON", "id": "CVE-2019-15801" }, { "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "db": "NVD", "id": "CVE-2019-15801" }, { "db": "CNNVD", "id": "CNNVD-201911-993" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41671" }, { "date": "2019-11-14T00:00:00", "db": "VULMON", "id": "CVE-2019-15801" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "date": "2019-11-14T21:15:11.750000", "db": "NVD", "id": "CVE-2019-15801" }, { "date": "2019-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-993" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41671" }, { "date": "2021-07-21T00:00:00", "db": "VULMON", "id": "CVE-2019-15801" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012184" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2019-15801" }, { "date": "2019-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-993" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-993" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel GS1900 Device firmware vulnerable to information disclosure from cache", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012184" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-993" } ], "trust": 0.6 } }
var-201911-1311
Vulnerability from variot
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted passwords for all users on the device. As these passwords are encrypted using well-known and static parameters, they can be decrypted and the original passwords (including the administrator password) can be obtained. Zyxel GS1900 There is a privilege management vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan.
A security hole exists in the Zyxel GS1900 using firmware 2.50 (AAHH.0) prior to C0. An attacker could exploit the vulnerability to obtain an administrative password
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1311", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs1900-8", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-8hp", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-10hp", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aazi.0\\)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahk.0\\)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahj.0\\)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahi.0\\)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aaho.0\\)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahm.0\\)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahh.0\\)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahn.0\\)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahl.0\\)c0" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900 \u003c2.50 c0", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" }, { "model": "gs1900-16", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "gs1900-8hp", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" }, { "model": "gs1900-10hp", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41667" }, { "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "db": "NVD", "id": "CVE-2019-15799" }, { "db": "CNNVD", "id": "CNNVD-201911-991" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-15799" } ] }, "cve": "CVE-2019-15799", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2019-15799", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-41667", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-15799", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-15799", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-41667", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201911-991", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41667" }, { "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "db": "NVD", "id": "CVE-2019-15799" }, { "db": "CNNVD", "id": "CNNVD-201911-991" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted passwords for all users on the device. As these passwords are encrypted using well-known and static parameters, they can be decrypted and the original passwords (including the administrator password) can be obtained. Zyxel GS1900 There is a privilege management vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan. \n\nA security hole exists in the Zyxel GS1900 using firmware 2.50 (AAHH.0) prior to C0. An attacker could exploit the vulnerability to obtain an administrative password", "sources": [ { "db": "NVD", "id": "CVE-2019-15799" }, { "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "db": "CNVD", "id": "CNVD-2019-41667" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-15799", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-012187", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-41667", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-991", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41667" }, { "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "db": "NVD", "id": "CVE-2019-15799" }, { "db": "CNNVD", "id": "CNNVD-201911-991" } ] }, "id": "VAR-201911-1311", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-41667" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41667" } ] }, "last_update_date": "2023-12-18T14:00:42.318000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel security advisory for GS1900 switch vulnerabilities", "trust": 0.8, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "title": "Patch for Unknown vulnerabilities in ZyXEL GS1900", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/191511" }, { "title": "ZyXEL GS1900 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=102961" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41667" }, { "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "db": "CNNVD", "id": "CNNVD-201911-991" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "db": "NVD", "id": "CVE-2019-15799" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15799" }, { "trust": 1.6, "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "trust": 1.6, "url": "https://vimeo.com/354726424" }, { "trust": 1.6, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15799" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41667" }, { "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "db": "NVD", "id": "CVE-2019-15799" }, { "db": "CNNVD", "id": "CNNVD-201911-991" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-41667" }, { "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "db": "NVD", "id": "CVE-2019-15799" }, { "db": "CNNVD", "id": "CNNVD-201911-991" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41667" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "date": "2019-11-14T21:15:11.623000", "db": "NVD", "id": "CVE-2019-15799" }, { "date": "2019-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-991" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41667" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012187" }, { "date": "2019-11-21T18:15:55.813000", "db": "NVD", "id": "CVE-2019-15799" }, { "date": "2019-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-991" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-991" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel GS1900 Vulnerability related to privilege management in device firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012187" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-991" } ], "trust": 0.6 } }
var-201911-1314
Vulnerability from variot
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) are used to encrypt and decrypt all passwords using AES256 in CBC mode. With the parameters known, all previously encrypted passwords can be decrypted. This includes the passwords that are part of configuration backups or otherwise embedded as part of the firmware. Zyxel GS1900 Device firmware contains a vulnerability related to the use of hard-coded credentials.Information may be obtained. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan.
A security hole exists in the Zyxel GS1900 with this version of firmware prior to 2.50 (AAHH.0)C0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1314", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs1900-8", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-8hp", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-10hp", "scope": "eq", "trust": 1.2, "vendor": "zyxel", "version": null }, { "model": "gs1900-10hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aazi.0\\)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahk.0\\)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahj.0\\)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahi.0\\)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aaho.0\\)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahm.0\\)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahh.0\\)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahn.0\\)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 1.0, "vendor": "zyxel", "version": "2.50\\(aahl.0\\)c0" }, { "model": "gs1900-10hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-16", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24e", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-24hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-48hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900-8hp", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "2.50(aahh.0)c0" }, { "model": "gs1900 \u003c2.50 c0", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" }, { "model": "gs1900-16", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "gs1900-8hp", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" }, { "model": "gs1900-10hp", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "2.40" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41670" }, { "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "db": "NVD", "id": "CVE-2019-15802" }, { "db": "CNNVD", "id": "CNNVD-201911-994" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-15802" } ] }, "cve": "CVE-2019-15802", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-15802", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-41670", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-15802", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-15802", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-41670", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201911-994", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41670" }, { "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "db": "NVD", "id": "CVE-2019-15802" }, { "db": "CNNVD", "id": "CNNVD-201911-994" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) are used to encrypt and decrypt all passwords using AES256 in CBC mode. With the parameters known, all previously encrypted passwords can be decrypted. This includes the passwords that are part of configuration backups or otherwise embedded as part of the firmware. Zyxel GS1900 Device firmware contains a vulnerability related to the use of hard-coded credentials.Information may be obtained. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan. \n\nA security hole exists in the Zyxel GS1900 with this version of firmware prior to 2.50 (AAHH.0)C0", "sources": [ { "db": "NVD", "id": "CVE-2019-15802" }, { "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "db": "CNVD", "id": "CNVD-2019-41670" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-15802", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-012252", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-41670", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-994", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41670" }, { "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "db": "NVD", "id": "CVE-2019-15802" }, { "db": "CNNVD", "id": "CNNVD-201911-994" } ] }, "id": "VAR-201911-1314", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-41670" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41670" } ] }, "last_update_date": "2023-12-18T13:33:15.327000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel security advisory for GS1900 switch vulnerabilities", "trust": 0.8, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "title": "Patch for Unknown vulnerability in ZyXEL GS1900 (CNVD-2019-41670)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/191503" }, { "title": "ZyXEL GS1900 Repair measures for trust management problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=103487" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41670" }, { "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "db": "CNNVD", "id": "CNNVD-201911-994" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "db": "NVD", "id": "CVE-2019-15802" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15802" }, { "trust": 1.6, "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "trust": 1.6, "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15802" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41670" }, { "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "db": "NVD", "id": "CVE-2019-15802" }, { "db": "CNNVD", "id": "CNNVD-201911-994" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-41670" }, { "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "db": "NVD", "id": "CVE-2019-15802" }, { "db": "CNNVD", "id": "CNNVD-201911-994" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41670" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "date": "2019-11-14T21:15:11.797000", "db": "NVD", "id": "CVE-2019-15802" }, { "date": "2019-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-994" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-41670" }, { "date": "2019-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012252" }, { "date": "2019-11-22T19:11:12.107000", "db": "NVD", "id": "CVE-2019-15802" }, { "date": "2019-11-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-994" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-994" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel GS1900 Vulnerabilities related to the use of hard-coded credentials in device firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012252" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-994" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD447145-9B13-4B3E-B35E-65AB4A576B8D", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "06D9347D-F0F3-4E9B-8EF6-AA2A723A55E6", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A54B9C24-6492-463F-8768-BF1E092D9077", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D2B2385-9DDF-4E5E-9CFE-12B0304568BF", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "674594F8-B90F-4D8E-82E4-9DE721BC52E5", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F69D2726-44BB-4AFB-9447-2220675020AE", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC29ADFF-27E6-4CFA-8C5F-32542AC36052", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4567A0DB-6E8E-4714-B573-8FEA4A571738", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DCDB75-4D17-4A05-AF5A-4ADA54A54142", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD68BF23-59DC-4449-9B53-ACBCC6F4A871", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A4D35C7-255C-4842-8D75-22CAC3E14C6C", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39C45C13-DD78-4486-833A-773A5F0A77A8", "versionEndExcluding": "2.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in the CGI program in Zyxel GS1900-8 firmware version V2.60, that did not properly sterilize packet contents and could allow an authenticated, local user to perform a cross-site scripting (XSS) attack via a crafted LLDP packet." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad en el programa CGI de Zyxel GS1900-8 versi\u00f3n del firmware V2.60, que no esterilizaba apropiadamente el contenido de los paquetes y pod\u00eda permitir a un usuario local autenticado llevar a cabo un ataque de tipo cross-site scripting (XSS) por medio de un paquete LLDP dise\u00f1ado" } ], "id": "CVE-2021-35030", "lastModified": "2024-11-21T06:11:42.450", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-26T12:15:08.817", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_XSS_vulnerability_of_GS1900_series_switches.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_XSS_vulnerability_of_GS1900_series_switches.shtml" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24ep_firmware | * | |
zyxel | gs1900-24ep | - | |
zyxel | gs1900-24hpv2_firmware | * | |
zyxel | gs1900-24hpv2 | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hpv2_firmware | * | |
zyxel | gs1900-48hpv2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDB5D07E-AAA1-439D-BC5F-CE005D328FF6", "versionEndExcluding": "2.90\\(aahh.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C325177-8525-4E2F-9B81-EBA020E33619", "versionEndExcluding": "2.90\\(aahi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECA64741-0758-4745-AC9A-961B6B01EA20", "versionEndExcluding": "2.90\\(aazi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "808A3620-BCAA-4D27-898F-66A3115BC9BE", "versionEndExcluding": "2.90\\(aahj.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B91466E-3D14-4D3F-BAC8-A2AD013E4A1D", "versionEndExcluding": "2.90\\(aahl.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C670835A-A0FB-422B-8F42-8722A46E4A5C", "versionEndExcluding": "2.90\\(aahk.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A390C08B-2771-4C10-B25D-07F51A4D931A", "versionEndExcluding": "2.90\\(abto.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC00E9BF-64D5-409A-BE15-B9A01EA1C257", "versionEndExcluding": "2.90\\(abtp.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "631DAB84-4EF2-482E-A9D2-DAA39278B259", "versionEndExcluding": "2.90\\(aahn.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61819161-7A19-4438-8343-7936DE1D237C", "versionEndExcluding": "2.90\\(abtq.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier\u00a0could allow an authenticated, LAN-based attacker with administrator privileges to cause denial of service (DoS) conditions via a crafted URL." }, { "lang": "es", "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en el programa CGI en el firmware del conmutador Zyxel GS1900-48 versi\u00f3n V2.80(AAHN.1)C0 y anteriores podr\u00eda permitir que un atacante autenticado basado en LAN con privilegios de administrador provoque condiciones de denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una URL manipulada." } ], "id": "CVE-2024-8882", "lastModified": "2024-11-14T13:42:12.347", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "security@zyxel.com.tw", "type": "Primary" } ] }, "published": "2024-11-12T02:15:19.160", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-and-buffer-overflow-vulnerabilities-in-gs1900-series-switches-11-12-2024" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security@zyxel.com.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24hp_firmware | * | |
zyxel | gs1900-24hp | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hp_firmware | * | |
zyxel | gs1900-48hp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5428A26-563D-47A7-A771-D6F20775EDF5", "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E6DB241-5659-414E-856E-C5D790D07F8B", "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D51F8F-8BCB-4571-A782-264B71C7CD76", "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3687A400-9D7F-453A-88D7-C87B85B6E4EB", "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6733BECF-F9A3-4748-8A96-DFB10A670C35", "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3A3C5E-2027-40EE-A9EF-983474E9DC07", "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D88D78-F7C9-45BB-8E47-2BD24B8616B2", "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6EA6D9E-B5D4-4043-90C5-409B5875A3B5", "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains \"Password recovery for specific user\" options. The menu is believed to be accessible using a serial console." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en los dispositivos Zyxel GS1900 con firmware anterior a 2.50(AAHH.0)C0. Mediante el envi\u00f3 de una se\u00f1al al proceso de la CLI, una funcionalidad no documentada es activada. Espec\u00edficamente, se puede activar un men\u00fa mediante el env\u00edo de la se\u00f1al SIGQUIT a la aplicaci\u00f3n de la CLI (por ejemplo, por medio de CTRL+\\ v\u00eda SSH). La comprobaci\u00f3n del control de acceso para este men\u00fa opera y proh\u00edbe acceder al men\u00fa, que contiene las opciones de \"Password recovery for specific user\". Se cree que es posible acceder al men\u00fa usando una consola en serie." } ], "id": "CVE-2019-15804", "lastModified": "2024-11-21T04:29:30.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T21:15:11.953", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24hp_firmware | * | |
zyxel | gs1900-24hp | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hp_firmware | * | |
zyxel | gs1900-48hp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5428A26-563D-47A7-A771-D6F20775EDF5", "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E6DB241-5659-414E-856E-C5D790D07F8B", "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D51F8F-8BCB-4571-A782-264B71C7CD76", "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3687A400-9D7F-453A-88D7-C87B85B6E4EB", "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6733BECF-F9A3-4748-8A96-DFB10A670C35", "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3A3C5E-2027-40EE-A9EF-983474E9DC07", "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D88D78-F7C9-45BB-8E47-2BD24B8616B2", "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6EA6D9E-B5D4-4043-90C5-409B5875A3B5", "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return TRUE with no actual checks performed. The diagnostics menu allows for reading/writing arbitrary registers and various other configuration parameters which are believed to be related to the network interface chips." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en los dispositivos Zyxel GS1900 con firmware anterior a la versi\u00f3n 2.50 (AAHH.0) C0. A trav\u00e9s de una secuencia indocumentada de pulsaciones de teclas, se activa la funcionalidad no documentada. Se activa un shell de diagn\u00f3stico a trav\u00e9s de CTRL-ALT-t, que solicita la contrase\u00f1a devuelta por fds_sys_passDebugPasswd_ret (). El firmware contiene comprobaciones de control de acceso que determinan si los usuarios remotos pueden acceder a esta funcionalidad. La funci\u00f3n que realiza esta comprobaci\u00f3n (fds_sys_remoteDebugEnable_ret en libfds.so) siempre devuelve VERDADERO sin realizar comprobaciones reales. El men\u00fa de diagn\u00f3stico permite leer / escribir registros arbitrarios y varios otros par\u00e1metros de configuraci\u00f3n que se cree que est\u00e1n relacionados con los chips de la interfaz de red." } ], "id": "CVE-2019-15803", "lastModified": "2024-11-21T04:29:29.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T21:15:11.890", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF8E2361-4094-4EF4-ABD1-2AA7F6306F17", "versionEndExcluding": "2.70\\(aahh.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B977BC02-1C92-4A11-B63B-08D521257313", "versionEndExcluding": "2.70\\(aahi.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0426305E-B895-4F3F-BBFD-B67532B23D45", "versionEndExcluding": "2.70\\(aazi.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEC06507-70AD-4518-A206-51DCF3A372EC", "versionEndExcluding": "2.70\\(aahj.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8FA189B-1FCD-4A54-8867-8F640EA6E23D", "versionEndExcluding": "2.70\\(aahk.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6A17B4-4E5A-4B59-8D4E-34D3D4E474FD", "versionEndExcluding": "2.70\\(abto.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDCE590C-002A-4DAA-84AB-23B976F0F510", "versionEndExcluding": "2.70\\(aahl.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A54568EB-94F3-4817-BD25-C5F52ED1B9AB", "versionEndExcluding": "2.70\\(aahm.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A11824-D68D-41F0-BA0B-69C6CEEC5948", "versionEndExcluding": "2.70\\(aatp.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFBB3AFE-A826-43DC-A18F-FFD68E08E23E", "versionEndExcluding": "2.70\\(aahn.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E7B8A54-65D5-41E6-89BF-0B4DF6D30125", "versionEndExcluding": "2.70\\(aaho.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAAE5234-410D-436F-86CD-744F3127AEAF", "versionEndExcluding": "2.70\\(abtq.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the \u0027libsal.so\u0027 of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call." }, { "lang": "es", "value": "Una vulnerabilidad en el archivo \"libsal.so\" del firmware de la serie Zyxel GS1900 versi\u00f3n 2.60, podr\u00eda permitir a un usuario local autenticado ejecutar comandos arbitrarios del sistema operativo por medio de una llamada de funci\u00f3n dise\u00f1ada" } ], "id": "CVE-2021-35032", "lastModified": "2024-11-21T06:11:42.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.9, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-28T11:15:07.583", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-48hpv2_firmware | * | |
zyxel | gs1900-48hpv2 | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-24hpv2_firmware | * | |
zyxel | gs1900-24hpv2 | - | |
zyxel | gs1900-24ep_firmware | * | |
zyxel | gs1900-24ep | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACACFF77-1C3D-4DBA-A179-500B5602ED46", "versionEndExcluding": "2.80\\(abtq.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F2E6F4E-9DA0-4AFB-B4A3-7C3E611DA2FA", "versionEndExcluding": "2.80\\(aahn.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3539C1D-6C16-4DFB-A601-F5346071F4D7", "versionEndExcluding": "2.80\\(abtp.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF16626B-7BBE-4BFF-A60E-02B0B1243217", "versionEndExcluding": "2.80\\(abto.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AE67A4-4CCE-4E95-840D-CB6F4F6FB00F", "versionEndIncluding": "2.80\\(aahk.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "441A359C-A00E-4B96-A321-F769259871B7", "versionEndIncluding": "2.80\\(aahl.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A657FCE5-BA80-4E22-934A-3B632A9200D7", "versionEndExcluding": "2.80\\(aahj.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4503BD65-51A5-4626-9076-021E6F7DF0B8", "versionEndExcluding": "2.80\\(aazi.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96F5E646-4DFD-4476-9D8B-9A8919C1F261", "versionEndExcluding": "2.80\\(aahi.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87482A53-9933-4A0B-9831-F16AF9CBFB46", "versionEndExcluding": "2.80\\(aahh.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insufficient entropy vulnerability caused by the improper use of a randomness function with low entropy for web authentication tokens generation exists in the Zyxel GS1900-10HP firmware version V2.80(AAZI.0)C0. This vulnerability could allow a LAN-based attacker a slight chance to gain a valid session token if multiple authenticated sessions are alive." }, { "lang": "es", "value": "Existe una vulnerabilidad de entrop\u00eda insuficiente causada por el uso indebido de una funci\u00f3n de aleatoriedad con baja entrop\u00eda para la generaci\u00f3n de tokens de autenticaci\u00f3n web en la versi\u00f3n de firmware V2.80(AAZI.0)C0 de Zyxel GS1900-10HP. Esta vulnerabilidad podr\u00eda permitir que un atacante basado en LAN tenga una peque\u00f1a posibilidad de obtener un token de sesi\u00f3n v\u00e1lido si hay varias sesiones autenticadas activas." } ], "id": "CVE-2024-38270", "lastModified": "2024-09-18T18:23:40.977", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-10T02:15:09.780", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-for-web-authentication-tokens-generation-in-gs1900-series-switches-09-10-2024" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-331" } ], "source": "security@zyxel.com.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | 2.70\(aahh.3\) | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | 2.70\(aahi.3\) | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | 2.70\(aazi.3\) | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | 2.70\(aahj.3\) | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24_firmware | 2.70\(aahl.3\) | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24e_firmware | 2.70\(aahk.3\) | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24ep_firmware | 2.70\(abto.3\) | |
zyxel | gs1900-24ep | - | |
zyxel | gs1900-24hpv2_firmware | 2.70\(abtp.3\) | |
zyxel | gs1900-24hpv2 | - | |
zyxel | gs1900-48_firmware | 2.70\(aahn.3\) | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hpv2_firmware | 2.70\(abtq.3\) | |
zyxel | gs1900-48hpv2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:2.70\\(aahh.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "527D0BFB-F841-4DCE-8E00-16323FC46996", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:2.70\\(aahi.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "4AA6A7D0-96D8-4949-8DD8-47EE58E2ECE0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:2.70\\(aazi.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E2C468E7-4D3F-4BDB-9CAE-A63D2A931E04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:2.70\\(aahj.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D131CC71-786E-435A-8D38-AEEEC2550EEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:2.70\\(aahl.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A4D69A3-AD61-4FCA-B413-916ABFE1947E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:2.70\\(aahk.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2160CDCE-C645-4AEF-9197-54172C0BBE9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:2.70\\(abto.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DD99781-1BB0-40E0-A5AE-3529F2C47042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:2.70\\(abtp.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B528417-3E19-4E00-A682-AFCD87D96D8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:2.70\\(aahn.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E4B3AE8C-CDC7-45F3-97CA-F5C2EE6B9D03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:2.70\\(abtq.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "309BFD9B-C152-4E8D-8E4A-FBDC65F17184", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version \n\nV2.70(AAHH.3)\u00a0and the GS1900-8HP firmware version\u00a0V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as \u0027root\u0027 on a vulnerable device via SSH." } ], "id": "CVE-2022-45853", "lastModified": "2025-01-10T18:15:14.623", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-30T11:15:09.237", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-privilege-escalation-vulnerability-in-gs1900-series-switches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-privilege-escalation-vulnerability-in-gs1900-series-switches" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@zyxel.com.tw", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24hp_firmware | * | |
zyxel | gs1900-24hp | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hp_firmware | * | |
zyxel | gs1900-48hp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5428A26-563D-47A7-A771-D6F20775EDF5", "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E6DB241-5659-414E-856E-C5D790D07F8B", "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D51F8F-8BCB-4571-A782-264B71C7CD76", "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3687A400-9D7F-453A-88D7-C87B85B6E4EB", "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6733BECF-F9A3-4748-8A96-DFB10A670C35", "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3A3C5E-2027-40EE-A9EF-983474E9DC07", "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D88D78-F7C9-45BB-8E47-2BD24B8616B2", "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6EA6D9E-B5D4-4043-90C5-409B5875A3B5", "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) are used to encrypt and decrypt all passwords using AES256 in CBC mode. With the parameters known, all previously encrypted passwords can be decrypted. This includes the passwords that are part of configuration backups or otherwise embedded as part of the firmware." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en los dispositivos Zyxel GS1900 con firmware anterior a la versi\u00f3n 2.50 (AAHH.0) C0. El firmware codifica y cifra las contrase\u00f1as con una clave criptogr\u00e1fica codificada en sal_util_str_encrypt () en libsal.so.0.0. Los par\u00e1metros (sal, IV y datos clave) se utilizan para cifrar y descifrar todas las contrase\u00f1as utilizando AES256 en modo CBC. Con los par\u00e1metros conocidos, se pueden descifrar todas las contrase\u00f1as previamente encriptadas. Esto incluye las contrase\u00f1as que forman parte de las copias de seguridad de la configuraci\u00f3n o que est\u00e1n integradas como parte del firmware." } ], "id": "CVE-2019-15802", "lastModified": "2024-11-21T04:29:29.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T21:15:11.797", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://vimeo.com/354726424 | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://vimeo.com/354726424 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24hp_firmware | * | |
zyxel | gs1900-24hp | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hp_firmware | * | |
zyxel | gs1900-48hp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5428A26-563D-47A7-A771-D6F20775EDF5", "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E6DB241-5659-414E-856E-C5D790D07F8B", "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D51F8F-8BCB-4571-A782-264B71C7CD76", "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3687A400-9D7F-453A-88D7-C87B85B6E4EB", "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6733BECF-F9A3-4748-8A96-DFB10A670C35", "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3A3C5E-2027-40EE-A9EF-983474E9DC07", "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D88D78-F7C9-45BB-8E47-2BD24B8616B2", "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6EA6D9E-B5D4-4043-90C5-409B5875A3B5", "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted passwords for all users on the device. As these passwords are encrypted using well-known and static parameters, they can be decrypted and the original passwords (including the administrator password) can be obtained." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en los dispositivos Zyxel GS1900 con firmware anterior a la versi\u00f3n 2.50 (AAHH.0) C0. Las cuentas de usuario creadas a trav\u00e9s de la interfaz web del dispositivo, cuando se les otorgan privilegios de nivel no administrativo, tienen el mismo nivel de acceso privilegiado que los administradores cuando se conectan al dispositivo a trav\u00e9s de SSH (mientras que sus permisos a trav\u00e9s de la interfaz web est\u00e1n de hecho restringidos). Esto permite a los usuarios normales obtener la contrase\u00f1a administrativa ejecutando el comando de soporte t\u00e9cnico a trav\u00e9s de la CLI: contiene las contrase\u00f1as cifradas para todos los usuarios en el dispositivo. Como estas contrase\u00f1as se cifran con par\u00e1metros conocidos y est\u00e1ticos, se pueden descifrar y se pueden obtener las contrase\u00f1as originales (incluida la contrase\u00f1a del administrador)." } ], "id": "CVE-2019-15799", "lastModified": "2024-11-21T04:29:29.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T21:15:11.623", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vimeo.com/354726424" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vimeo.com/354726424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24ep_firmware | * | |
zyxel | gs1900-24ep | - | |
zyxel | gs1900-24hpv2_firmware | * | |
zyxel | gs1900-24hpv2 | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hpv2_firmware | * | |
zyxel | gs1900-48hpv2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDB5D07E-AAA1-439D-BC5F-CE005D328FF6", "versionEndExcluding": "2.90\\(aahh.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C325177-8525-4E2F-9B81-EBA020E33619", "versionEndExcluding": "2.90\\(aahi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECA64741-0758-4745-AC9A-961B6B01EA20", "versionEndExcluding": "2.90\\(aazi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "808A3620-BCAA-4D27-898F-66A3115BC9BE", "versionEndExcluding": "2.90\\(aahj.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B91466E-3D14-4D3F-BAC8-A2AD013E4A1D", "versionEndExcluding": "2.90\\(aahl.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C670835A-A0FB-422B-8F42-8722A46E4A5C", "versionEndExcluding": "2.90\\(aahk.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A390C08B-2771-4C10-B25D-07F51A4D931A", "versionEndExcluding": "2.90\\(abto.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC00E9BF-64D5-409A-BE15-B9A01EA1C257", "versionEndExcluding": "2.90\\(abtp.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "631DAB84-4EF2-482E-A9D2-DAA39278B259", "versionEndExcluding": "2.90\\(aahn.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61819161-7A19-4438-8343-7936DE1D237C", "versionEndExcluding": "2.90\\(abtq.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A post-authentication command injection vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to execute some operating system (OS) commands on an affected device by sending a crafted HTTP request." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de comandos posterior a la autenticaci\u00f3n en el programa CGI en el firmware del conmutador Zyxel GS1900-48 versi\u00f3n V2.80(AAHN.1)C0 y anteriores podr\u00eda permitir que un atacante autenticado basado en LAN con privilegios de administrador ejecute algunos comandos del sistema operativo (OS) en un dispositivo afectado mediante el env\u00edo de una solicitud HTTP manipulada." } ], "id": "CVE-2024-8881", "lastModified": "2024-11-14T13:51:11.257", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "security@zyxel.com.tw", "type": "Primary" } ] }, "published": "2024-11-12T02:15:18.817", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-and-buffer-overflow-vulnerabilities-in-gs1900-series-switches-11-12-2024" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-48hpv2_firmware | * | |
zyxel | gs1900-48hpv2 | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-24hpv2_firmware | * | |
zyxel | gs1900-24hpv2 | - | |
zyxel | gs1900-24ep_firmware | * | |
zyxel | gs1900-24ep | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA14022B-4409-4725-BB26-2E85DC8BA02A", "versionEndIncluding": "2.70\\(abtq.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BB5CC06-9693-4951-BB8D-70CAF93C805E", "versionEndIncluding": "2.70\\(aahn.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F9A3EA9-5893-46AC-AECB-DE0A30DD0498", "versionEndIncluding": "2.70\\(abtp.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C96ECDC-3D00-4AA9-8E72-78ABC672D637", "versionEndIncluding": "2.70\\(abto.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E14B4311-5435-41DF-B0AC-32156D386D41", "versionEndIncluding": "2.70\\(aahk.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE64CC41-E4E4-4FED-88B9-FEC05FA7B0B6", "versionEndIncluding": "2.70\\(aahl.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A68FFD4-FEFF-49F0-9091-9B2E5F0C707C", "versionEndIncluding": "2.70\\(aahj.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC5EBAF1-3805-4332-9573-70E119244A71", "versionEndIncluding": "2.70\\(aazi.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C6E4B8A-4EC0-4BF6-81FE-40B5AA4B68A8", "versionEndIncluding": "2.70\\(aahi.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13BF4CC3-F378-41D6-AAE1-4A5FA9C176C3", "versionEndIncluding": "2.70\\(aahh.5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The improper privilege management vulnerability in the Zyxel GS1900-24EP switch firmware version\u00a0V2.70(ABTO.5) could allow an authenticated local user with read-only access to modify system settings on a vulnerable device." }, { "lang": "es", "value": "La vulnerabilidad de administraci\u00f3n de privilegios inadecuada en Zyxel GS1900-24EP switch firmware versi\u00f3n V2.70 (ABTO.5) podr\u00eda permitir que un usuario local autenticado con acceso de solo lectura modifique la configuraci\u00f3n del sistema en un dispositivo vulnerable." } ], "id": "CVE-2023-35140", "lastModified": "2024-11-21T08:08:01.030", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security@zyxel.com.tw", "type": "Primary" } ] }, "published": "2023-11-07T05:15:12.077", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-improper-privilege-management-vulnerability-in-gs1900-series-switches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-improper-privilege-management-vulnerability-in-gs1900-series-switches" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@zyxel.com.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24hp_firmware | * | |
zyxel | gs1900-24hp | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hp_firmware | * | |
zyxel | gs1900-48hp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5428A26-563D-47A7-A771-D6F20775EDF5", "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E6DB241-5659-414E-856E-C5D790D07F8B", "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D51F8F-8BCB-4571-A782-264B71C7CD76", "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3687A400-9D7F-453A-88D7-C87B85B6E4EB", "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6733BECF-F9A3-4748-8A96-DFB10A670C35", "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3A3C5E-2027-40EE-A9EF-983474E9DC07", "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D88D78-F7C9-45BB-8E47-2BD24B8616B2", "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6EA6D9E-B5D4-4043-90C5-409B5875A3B5", "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en los dispositivos Zyxel GS1900 con firmware anterior a la versi\u00f3n 2.50 (AAHH.0) C0. La imagen del firmware contiene contrase\u00f1as cifradas que se utilizan para autenticar a los usuarios que desean acceder a un men\u00fa de diagn\u00f3stico o recuperaci\u00f3n de contrase\u00f1a. Usando la clave criptogr\u00e1fica codificada que se encuentra en otra parte del firmware, estas contrase\u00f1as se pueden descifrar. Esto est\u00e1 relacionado con fds_sys_passDebugPasswd_ret () y fds_sys_passRecoveryPasswd_ret () en libfds.so.0.0." } ], "id": "CVE-2019-15801", "lastModified": "2024-11-21T04:29:29.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T21:15:11.750", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.kb.cert.org/vuls/id/566724 | Third Party Advisory, US Government Resource | |
cret@cert.org | http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/566724 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nwa1100-n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D2E585A-9A92-4A4A-9496-61C3F9AD74C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nwa1100-n:-:*:*:*:*:*:*:*", "matchCriteriaId": "6904F1E3-5032-4FC8-95C9-1E2267A19382", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nwa1100-nh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDF4B052-913F-477D-BCCC-2CE965F6FE13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nwa1100-nh:-:*:*:*:*:*:*:*", "matchCriteriaId": "F73B7235-D7A0-4931-A92E-4B1BEE2102F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nwa1121-ni_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CCCE350-59AB-42A1-AA17-F82289D5BCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nwa1121-ni:-:*:*:*:*:*:*:*", "matchCriteriaId": "5156EAF7-E47F-4A8A-BB6C-047969276060", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nwa1123-ac_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30A700E3-2BC9-4BCF-A0FC-F7EFB1DF7392", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nwa1123-ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4261C53-83AC-4440-8408-7A8DFFE10F04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nwa1123-ni_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "258C8E28-0C36-4B59-A047-938779FECD9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nwa1123-ni:-:*:*:*:*:*:*:*", "matchCriteriaId": "98A7D843-1F0F-4173-A581-73B60130C7EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:p-660hn-51_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C16165B-FD30-43B0-965E-CBC8C46B1DB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:p-660hn-51:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0138796-FFDC-4976-83AB-018DD7CD7D5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:p-663hn-51_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DAE774-A4DE-4F56-A22B-0C2AE261BEDC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:p-663hn-51:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F2A8EAA-E91F-48D8-82F9-0719C6F6BB2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8CC0C61-EB6A-4736-80E3-B69693D4A2B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B6C4A31-3B83-444F-B5F8-1397B43B2211", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:vmg1312-b30a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B0F62E6-04C9-4611-8C82-80DD8D58757F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:vmg1312-b30a:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD5CB070-4FD9-4393-94BF-40E3FD0C596F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:vmg1312-b30b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C4A52F8-F5FD-4E53-BBE6-69F673A7904B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:vmg1312-b30b:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5CF7CD5-ADE5-4F77-9F81-C0FF32A5E267", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4808FDF8-4815-4C4F-AFE7-31EADE517B31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "88BA2BDF-9ACA-4F89-B7B7-FD232A6399CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF0AFA0F-D126-4D1C-89EC-878AB0F5E74C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "53C32749-82A6-42AA-9EBE-11014F161D2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11BEC42C-7815-4EA3-B1E5-66E2443B5032", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "96DC6BBF-15B8-496F-85FE-5373B6CEDC3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:vmg8924-b30a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CB88CC1-9F13-4EB1-AF6D-5ED44EFB9868", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:vmg8924-b30a:-:*:*:*:*:*:*:*", "matchCriteriaId": "89D58204-B0DB-4C36-A619-FA5969797CF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:vsg1435-b101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5047833-C798-4111-8C97-CE9B70F7834D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:vsg1435-b101:-:*:*:*:*:*:*:*", "matchCriteriaId": "C31517DD-3D1B-4F9D-8673-145927CADFBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41AF2B1B-A5BB-4F40-9C30-6AD665AE5596", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:pmg5318-b20a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EF6C90D-9BF3-4302-B834-BC897473E502", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "852E8F04-4C28-4904-AA4A-ACE4EAD6DC31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*", "matchCriteriaId": "902A735D-2D84-4183-B4B3-FA36AD9F13A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B338AE18-ECE4-4B90-A1D5-16F2983464E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4658399-1699-4426-ACFF-BDEE20BF1A54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4B86C-ED2F-406D-BCAA-B970BAD248D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:sbg3500-n000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1E3BCE8-F36A-4FFE-933B-6BADF24506AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "316DC84A-7B3C-4396-A0BD-EAA3B5DA0476", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91426AF7-9D95-486F-9155-B4F9636F3CEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:c1000z_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC9FB893-7F6A-48AD-B3C8-FC85A6A80CEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:c1000z:-:*:*:*:*:*:*:*", "matchCriteriaId": "812C4AFE-364D-4D18-A79F-6CD98EDDC3B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:q1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8090C667-2E54-462F-BD5A-DF7854252A0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:q1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2A44DC-DFB9-46A8-BD9B-B207BBFFD764", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:fr1000z_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23ADD49B-C666-4E28-813A-55DB6BEF4EB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:fr1000z:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA597CC9-92FE-47AC-86F9-FA5B2E032961", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:p8702n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59D9B829-FD92-46D2-840F-A99E5FF0DC4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:p8702n:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C906711-7699-4A0A-BA3C-7A007EDF301E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys." }, { "lang": "es", "value": "Los puntos de acceso ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, NWA1123-NI; los CPE DSL P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, VSG1435-B101; las puertas de enlace para peque\u00f1as empresas PMG5318-B20A GPON, SBG3300-N000, SBG3300-NB00, SBG3500-N000; los switches GS1900-8 y GS1900-24 y los modelos de m\u00f3dem C1000Z, Q1000, FR1000Z, P8702N emplean certificados X.509 y claves host de SSH que no son \u00fanicos." } ], "id": "CVE-2015-7256", "lastModified": "2024-11-21T02:36:26.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-28T01:29:00.670", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF8E2361-4094-4EF4-ABD1-2AA7F6306F17", "versionEndExcluding": "2.70\\(aahh.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B977BC02-1C92-4A11-B63B-08D521257313", "versionEndExcluding": "2.70\\(aahi.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0426305E-B895-4F3F-BBFD-B67532B23D45", "versionEndExcluding": "2.70\\(aazi.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEC06507-70AD-4518-A206-51DCF3A372EC", "versionEndExcluding": "2.70\\(aahj.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8FA189B-1FCD-4A54-8867-8F640EA6E23D", "versionEndExcluding": "2.70\\(aahk.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6A17B4-4E5A-4B59-8D4E-34D3D4E474FD", "versionEndExcluding": "2.70\\(abto.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDCE590C-002A-4DAA-84AB-23B976F0F510", "versionEndExcluding": "2.70\\(aahl.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A54568EB-94F3-4817-BD25-C5F52ED1B9AB", "versionEndExcluding": "2.70\\(aahm.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A11824-D68D-41F0-BA0B-69C6CEEC5948", "versionEndExcluding": "2.70\\(aatp.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFBB3AFE-A826-43DC-A18F-FFD68E08E23E", "versionEndExcluding": "2.70\\(aahn.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E7B8A54-65D5-41E6-89BF-0B4DF6D30125", "versionEndExcluding": "2.70\\(aaho.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAAE5234-410D-436F-86CD-744F3127AEAF", "versionEndExcluding": "2.70\\(abtq.0\\)-20211208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:xgs1210-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB20E61-9B6E-4AD4-B365-98ED5546F7EF", "versionEndExcluding": "1.00\\(abty.5\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:xgs1210-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "79ECDFC6-ABE3-43A1-BE57-4EC8C7F2896E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:xgs1250-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "678F3EF1-23DA-4252-A284-F639CFC5CB8A", "versionEndExcluding": "1.00\\(abwe.1\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:xgs1250-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BAEB6C1-5F51-4AAC-B8D3-5F06F139639E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device." }, { "lang": "es", "value": "Una vulnerabilidad en el cliente TFTP del firmware de la serie Zyxel GS1900 versi\u00f3n 2.60, podr\u00eda permitir a un usuario local autenticado ejecutar comandos arbitrarios del SO" } ], "id": "CVE-2021-35031", "lastModified": "2024-11-21T06:11:42.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-28T11:15:07.463", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24hp_firmware | * | |
zyxel | gs1900-24hp | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hp_firmware | * | |
zyxel | gs1900-48hp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5428A26-563D-47A7-A771-D6F20775EDF5", "versionEndExcluding": "2.50\\(aahh.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E6DB241-5659-414E-856E-C5D790D07F8B", "versionEndExcluding": "2.50\\(aahi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D51F8F-8BCB-4571-A782-264B71C7CD76", "versionEndExcluding": "2.50\\(aahj.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3687A400-9D7F-453A-88D7-C87B85B6E4EB", "versionEndExcluding": "2.50\\(aahk.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6733BECF-F9A3-4748-8A96-DFB10A670C35", "versionEndExcluding": "2.50\\(aahl.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3A3C5E-2027-40EE-A9EF-983474E9DC07", "versionEndExcluding": "2.50\\(aahm.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B1D264-99AC-4AA8-955C-602F2DA5B885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D88D78-F7C9-45BB-8E47-2BD24B8616B2", "versionEndExcluding": "2.50\\(aahn.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6EA6D9E-B5D4-4043-90C5-409B5875A3B5", "versionEndExcluding": "2.50\\(aaho.0\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "566A9E8C-AF55-4331-B9B0-F65EB900B0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.)" }, { "lang": "es", "value": "Se descubri\u00f3 un problema en los dispositivos Zyxel GS1900 con firmware anterior a 2.50 (AAHH.0) C0. Debido a la falta de validaci\u00f3n de entrada en las funciones cmd_sys_traceroute_exec (), cmd_sys_arp_clear () y cmd_sys_ping_exec () en la biblioteca libclicmd.so contenida en el firmware, un atacante podr\u00eda aprovechar estas funciones para llamar al sistema () y ejecutar comandos arbitrarios en los conmutadores . (Tenga en cuenta que estas funciones no se invocan actualmente en esta versi\u00f3n del firmware, sin embargo, un atacante podr\u00eda usar otras vulnerabilidades para finalmente usar estas vulnerabilidades para obtener la ejecuci\u00f3n del c\u00f3digo)." } ], "id": "CVE-2019-15800", "lastModified": "2024-11-21T04:29:29.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T21:15:11.687", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24ep_firmware | * | |
zyxel | gs1900-24ep | - | |
zyxel | gs1900-24hpv2_firmware | * | |
zyxel | gs1900-24hpv2 | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hpv2_firmware | * | |
zyxel | gs1900-48hpv2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8C89E9-1F95-41E8-9E03-ACF475F2D2D0", "versionEndExcluding": "2.70\\(aahh.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "309B1AEB-4154-42A1-B892-EC511A3C03F0", "versionEndExcluding": "2.70\\(aahi.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BDB45D9-2EF6-41FC-94A4-FFE7D3105C43", "versionEndExcluding": "2.70\\(aazi.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FC381F1-041B-4634-9F67-698E29037955", "versionEndExcluding": "2.70\\(aahj.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B87441A-7C43-4B63-99D5-BA70364F062D", "versionEndExcluding": "2.70\\(aahl.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1AF52CD-C62F-41C5-89BB-253A6F5C3624", "versionEndExcluding": "2.70\\(aahk.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EEEAB28-5FE5-42E4-88E6-9BCDA03B9420", "versionEndExcluding": "2.70\\(abto.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1841493A-E849-413B-B39D-77A8E940B138", "versionEndExcluding": "2.70\\(abtp.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17331D45-94BA-489F-BA8A-53F72026244C", "versionEndExcluding": "2.70\\(aahn.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A2CB26-844A-41ED-A59A-E67ACD371DCA", "versionEndExcluding": "2.70\\(abtq.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insufficient entropy vulnerability caused by the improper use of randomness sources with low entropy for RSA key pair generation was found in Zyxel GS1900 series firmware versions prior to V2.70. This vulnerability could allow an unauthenticated attacker to retrieve a private key by factoring the RSA modulus N in the certificate of the web administration interface." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad de entrop\u00eda insuficiente causada por el uso inapropiado de fuentes de aleatoriedad con baja entrop\u00eda para la generaci\u00f3n de pares de claves RSA en las versiones de firmware de la serie Zyxel GS1900 versiones anteriores a V2.70. Esta vulnerabilidad podr\u00eda permitir a un atacante no autenticado recuperar una clave privada mediante la factorizaci\u00f3n del m\u00f3dulo N de RSA en el certificado de la interfaz de administraci\u00f3n web" } ], "id": "CVE-2022-34746", "lastModified": "2024-11-21T07:10:06.513", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-20T02:15:08.640", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-331" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-331" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }