#VU58335 Credentials management in ZyXEL Communications Corp. Hardware solutions


Published: 2021-11-24

Vulnerability identifier: #VU58335

Vulnerability risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35033

CWE-ID: CWE-255

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
NBG6818
Hardware solutions / Firmware
NBG7815
Hardware solutions / Firmware
WSQ20
Hardware solutions / Firmware
WSQ50
Hardware solutions / Firmware
WSQ60
Hardware solutions / Firmware
WSR30
Hardware solutions / Firmware

Vendor: ZyXEL Communications Corp.

Description

The vulnerability allows a local user can compromise the target system.

The vulnerability exists due to improper password management. A local user can dismantle and take the device, connect to it using a USB-to-UART cable and gain root access.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

NBG6818: All versions

NBG7815: All versions

WSQ20: All versions

WSQ50: All versions

WSQ60: All versions

WSR30: All versions


External links
http://www.zyxel.com/support/Zyxel_security_advisory_for_pre-configured_password_management_vulnerability_of_home_routers_and_WiFi_systems.shtml


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability