Логотип exploitDog
bind:CVE-2019-15801
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-15801

Количество 3

Количество 3

nvd логотип

CVE-2019-15801

около 6 лет назад

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-g22q-gmqw-xvw4

больше 3 лет назад

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0.

EPSS: Низкий
fstec логотип

BDU:2019-04655

около 6 лет назад

Уязвимость функций fds_sys_passDebugPasswd_ret() и fds_sys_passRecoveryPasswd_ret() (libfds.so.0.0) микропрограммного обеспечения маршрутизаторов Zyxel серии GS1900, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-15801

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0.

CVSS3: 7.5
0%
Низкий
около 6 лет назад
github логотип
GHSA-g22q-gmqw-xvw4

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-04655

Уязвимость функций fds_sys_passDebugPasswd_ret() и fds_sys_passRecoveryPasswd_ret() (libfds.so.0.0) микропрограммного обеспечения маршрутизаторов Zyxel серии GS1900, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.5
0%
Низкий
около 6 лет назад

Уязвимостей на страницу