Search criteria

2 vulnerabilities by ZLAN Information Technology Co.

CVE-2026-24789 (GCVE-0-2026-24789)

Vulnerability from cvelistv5 – Published: 2026-02-11 16:17 – Updated: 2026-02-11 16:45
VLAI?
Title
ZLAN Information Technology ZLAN5143D Missing Authentication for Critical Function
Summary
An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication.
CWE
Assigner
Impacted products
Credits
Shorabh Karir and Deepak Singh of KPMG reported these vulnerabilities to CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-24789",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-11T16:44:50.414629Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-11T16:45:23.479Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ZLAN5143D",
          "vendor": "ZLAN Information Technology Co.",
          "versions": [
            {
              "status": "affected",
              "version": "v1.600"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Shorabh Karir and Deepak Singh of KPMG reported these vulnerabilities to CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication."
            }
          ],
          "value": "An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-11T16:24:41.818Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-02"
        },
        {
          "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-041-02.json"
        },
        {
          "url": "https://www.zlmcu.com/en/contact_us.htm"
        }
      ],
      "source": {
        "advisory": "ICSA-26-041-02",
        "discovery": "EXTERNAL"
      },
      "title": "ZLAN Information Technology ZLAN5143D Missing Authentication for Critical Function",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "ZLAN Information Technology Co. did not respond to CISA\u0027s attempts at \ncoordination. Users of ZLAN5143D devices are encouraged to contact ZLAN \nand keep their systems up to date. \n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.zlmcu.com/en/contatct_us.htm\"\u003ehttps://www.zlmcu.com/en/contatct_us.htm\u003c/a\u003e\n\n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.zlmcu.com/en/contatct_us.htm\"\u003e\u003c/a\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "ZLAN Information Technology Co. did not respond to CISA\u0027s attempts at \ncoordination. Users of ZLAN5143D devices are encouraged to contact ZLAN \nand keep their systems up to date. \n https://www.zlmcu.com/en/contatct_us.htm \n\n  https://www.zlmcu.com/en/contatct_us.htm"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2026-24789",
    "datePublished": "2026-02-11T16:17:19.702Z",
    "dateReserved": "2026-01-29T21:07:29.858Z",
    "dateUpdated": "2026-02-11T16:45:23.479Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-25084 (GCVE-0-2026-25084)

Vulnerability from cvelistv5 – Published: 2026-02-11 16:11 – Updated: 2026-02-11 16:47
VLAI?
Title
ZLAN Information Technology ZLAN5143D Missing Authentication for Critical Function
Summary
Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Credits
Shorabh Karir and Deepak Singh of KPMG reported these vulnerabilities to CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-25084",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-11T16:46:49.382065Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-11T16:47:23.667Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ZLAN5143D",
          "vendor": "ZLAN Information Technology Co.",
          "versions": [
            {
              "status": "affected",
              "version": "v1.600"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Shorabh Karir and Deepak Singh of KPMG reported these vulnerabilities to CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs."
            }
          ],
          "value": "Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-11T16:25:17.533Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-02"
        },
        {
          "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-041-02.json"
        },
        {
          "url": "https://www.zlmcu.com/en/contact_us.htm"
        }
      ],
      "source": {
        "advisory": "ICSA-26-041-02",
        "discovery": "EXTERNAL"
      },
      "title": "ZLAN Information Technology ZLAN5143D Missing Authentication for Critical Function",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "ZLAN Information Technology Co. did not respond to CISA\u0027s attempts at \ncoordination. Users of ZLAN5143D devices are encouraged to contact ZLAN \nand keep their systems up to date. \n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.zlmcu.com/en/contatct_us.htm\"\u003ehttps://www.zlmcu.com/en/contatct_us.htm\u003c/a\u003e\n\n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.zlmcu.com/en/contatct_us.htm\"\u003e\u003c/a\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "ZLAN Information Technology Co. did not respond to CISA\u0027s attempts at \ncoordination. Users of ZLAN5143D devices are encouraged to contact ZLAN \nand keep their systems up to date. \n https://www.zlmcu.com/en/contatct_us.htm \n\n  https://www.zlmcu.com/en/contatct_us.htm"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2026-25084",
    "datePublished": "2026-02-11T16:11:08.151Z",
    "dateReserved": "2026-01-29T21:07:29.846Z",
    "dateUpdated": "2026-02-11T16:47:23.667Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}