#VU83518 Improper Privilege Management in ZyXEL Communications Corp. Hardware solutions


Published: 2023-11-28

Vulnerability identifier: #VU83518

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-37925

CWE-ID: CWE-269

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
ATP series
Hardware solutions / Routers for home users
USG FLEX series
Client/Desktop applications / Antivirus software/Personal firewalls
VPN series
Client/Desktop applications / Antivirus software/Personal firewalls
USG FLEX 50W
Hardware solutions / Firmware
USG20W-VPN
Hardware solutions / Firmware
NWA110AX
Hardware solutions / Firmware
NWA210AX
Hardware solutions / Firmware
NWA1123ACv3
Hardware solutions / Firmware
WAC500
Hardware solutions / Firmware
WAC500H
Hardware solutions / Firmware
WAX510D
Hardware solutions / Firmware
WAX610D
Hardware solutions / Firmware
WAX650S
Hardware solutions / Firmware
NWA50AX
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA50AX-PRO
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA55AXE
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA90AX
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA90AX-PRO
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA220AX-6E
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX300H
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX620D-6E
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX630S
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX640S-6E
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX655E
Hardware solutions / Routers & switches, VoIP, GSM, etc
WBE660S
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: ZyXEL Communications Corp.

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper privilege management in the debug CLI command. A local user can access system files on the target device.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

ATP series: 4.32 - 5.37

USG FLEX series: 4.50 - 5.37

USG FLEX 50W: 4.16 - 5.37

USG20W-VPN: 4.16 - 5.37

VPN series: 4.30 - 5.37

NWA50AX: 6.29(ABYW.2)

NWA50AX-PRO: 6.65(ACGE.1)

NWA55AXE: 6.29(ABZL.2)

NWA90AX: 6.29(ACCV.2)

NWA90AX-PRO: 6.65(ACGF.1)

NWA110AX: 6.65(ABTG.1)

NWA210AX: 6.65(ABTD.1)

NWA220AX-6E: 6.65(ACCO.1)

NWA1123ACv3: 6.65(ABVT.1)

WAC500: 6.65(ABVS.1)

WAC500H: 6.65(ABWA.1)

WAX300H: 6.60(ACHF.1)

WAX510D: 6.65(ABTF.1)

WAX610D: 6.65(ABTE.1)

WAX620D-6E: 6.65(ACCN.1)

WAX630S: 6.65(ABZD.1)

WAX640S-6E: 6.65(ACCM.1)

WAX650S: 6.65(ABRM.1)

WAX655E: 6.65(ACDO.1)

WBE660S: 6.65(ACGG.1)


External links
http://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability