Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g22q-gmqw-xvw4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0.

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0.

EPSS

Процентиль: 52%
0.00286
Низкий

Дефекты

CWE-522

Связанные уязвимости

CVSS3: 7.5
nvd
около 6 лет назад

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0.

CVSS3: 7.5
fstec
около 6 лет назад

Уязвимость функций fds_sys_passDebugPasswd_ret() и fds_sys_passRecoveryPasswd_ret() (libfds.so.0.0) микропрограммного обеспечения маршрутизаторов Zyxel серии GS1900, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 52%
0.00286
Низкий

Дефекты

CWE-522