Vulnerability identifier: #VU83523
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-269
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
NWA50AX
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NWA50AX-PRO
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NWA55AXE
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NWA90AX
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NWA90AX-PRO
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NWA220AX-6E
Hardware solutions /
Routers & switches, VoIP, GSM, etc
WAX300H
Hardware solutions /
Routers & switches, VoIP, GSM, etc
WAX620D-6E
Hardware solutions /
Routers & switches, VoIP, GSM, etc
WAX630S
Hardware solutions /
Routers & switches, VoIP, GSM, etc
WAX640S-6E
Hardware solutions /
Routers & switches, VoIP, GSM, etc
WAX655E
Hardware solutions /
Routers & switches, VoIP, GSM, etc
WBE660S
Hardware solutions /
Routers & switches, VoIP, GSM, etc
NWA110AX
Hardware solutions /
Firmware
NWA210AX
Hardware solutions /
Firmware
NWA1123ACv3
Hardware solutions /
Firmware
WAC500
Hardware solutions /
Firmware
WAC500H
Hardware solutions /
Firmware
WAX510D
Hardware solutions /
Firmware
WAX610D
Hardware solutions /
Firmware
WAX650S
Hardware solutions /
Firmware
USG FLEX 50W
Hardware solutions /
Firmware
USG20W-VPN
Hardware solutions /
Firmware
ATP series
Hardware solutions /
Routers for home users
USG FLEX series
Client/Desktop applications /
Antivirus software/Personal firewalls
VPN series
Client/Desktop applications /
Antivirus software/Personal firewalls
Vendor: ZyXEL Communications Corp.
Description
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper privilege management in the debug CLI command. A local user can access the administrator’s logs on the target device.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
NWA50AX: 6.29(ABYW.2)
NWA50AX-PRO: 6.65(ACGE.1)
NWA55AXE: 6.29(ABZL.2)
NWA90AX: 6.29(ACCV.2)
NWA90AX-PRO: 6.65(ACGF.1)
NWA110AX: 6.65(ABTG.1)
NWA210AX: 6.65(ABTD.1)
NWA220AX-6E: 6.65(ACCO.1)
NWA1123ACv3: 6.65(ABVT.1)
WAC500: 6.65(ABVS.1)
WAC500H: 6.65(ABWA.1)
WAX300H: 6.60(ACHF.1)
WAX510D: 6.65(ABTF.1)
WAX610D: 6.65(ABTE.1)
WAX620D-6E: 6.65(ACCN.1)
WAX630S: 6.65(ABZD.1)
WAX640S-6E: 6.65(ACCM.1)
WAX650S: 6.65(ABRM.1)
WAX655E: 6.65(ACDO.1)
WBE660S: 6.65(ACGG.1)
ATP series: 4.32 - 5.37
USG FLEX series: 4.50 - 5.37
USG FLEX 50W: 4.16 - 5.37
USG20W-VPN: 4.16 - 5.37
VPN series: 4.30 - 5.37
External links
http://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.