Vulnerability identifier: #VU83522
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-269
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
ATP series
Hardware solutions /
Routers for home users
USG FLEX series
Client/Desktop applications /
Antivirus software/Personal firewalls
VPN series
Client/Desktop applications /
Antivirus software/Personal firewalls
USG FLEX 50W
Hardware solutions /
Firmware
USG20W-VPN
Hardware solutions /
Firmware
Vendor: ZyXEL Communications Corp.
Description
The vulnerability allows a local user to escalate privileges.
The vulnerability exists due to improper privilege management in the ZySH. A local user can modify the URL of the registration page in the web GUI of the target device.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
ATP series: 4.32 - 5.37
USG FLEX series: 4.50 - 5.37
USG FLEX 50W: 4.16 - 5.37
USG20W-VPN: 4.16 - 5.37
VPN series: 4.30 - 5.37
External links
http://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.