#VU83523 Improper Privilege Management in ZyXEL Communications Corp. Client/Desktop applications


Published: 2023-11-28

Vulnerability identifier: #VU83523

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-5797

CWE-ID: CWE-269

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
NWA50AX
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA50AX-PRO
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA55AXE
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA90AX
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA90AX-PRO
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA220AX-6E
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX300H
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX620D-6E
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX630S
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX640S-6E
Hardware solutions / Routers & switches, VoIP, GSM, etc
WAX655E
Hardware solutions / Routers & switches, VoIP, GSM, etc
WBE660S
Hardware solutions / Routers & switches, VoIP, GSM, etc
NWA110AX
Hardware solutions / Firmware
NWA210AX
Hardware solutions / Firmware
NWA1123ACv3
Hardware solutions / Firmware
WAC500
Hardware solutions / Firmware
WAC500H
Hardware solutions / Firmware
WAX510D
Hardware solutions / Firmware
WAX610D
Hardware solutions / Firmware
WAX650S
Hardware solutions / Firmware
USG FLEX 50W
Hardware solutions / Firmware
USG20W-VPN
Hardware solutions / Firmware
ATP series
Hardware solutions / Routers for home users
USG FLEX series
Client/Desktop applications / Antivirus software/Personal firewalls
VPN series
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor: ZyXEL Communications Corp.

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper privilege management in the debug CLI command. A local user can access the administrator’s logs on the target device.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

NWA50AX: 6.29(ABYW.2)

NWA50AX-PRO: 6.65(ACGE.1)

NWA55AXE: 6.29(ABZL.2)

NWA90AX: 6.29(ACCV.2)

NWA90AX-PRO: 6.65(ACGF.1)

NWA110AX: 6.65(ABTG.1)

NWA210AX: 6.65(ABTD.1)

NWA220AX-6E: 6.65(ACCO.1)

NWA1123ACv3: 6.65(ABVT.1)

WAC500: 6.65(ABVS.1)

WAC500H: 6.65(ABWA.1)

WAX300H: 6.60(ACHF.1)

WAX510D: 6.65(ABTF.1)

WAX610D: 6.65(ABTE.1)

WAX620D-6E: 6.65(ACCN.1)

WAX630S: 6.65(ABZD.1)

WAX640S-6E: 6.65(ACCM.1)

WAX650S: 6.65(ABRM.1)

WAX655E: 6.65(ACDO.1)

WBE660S: 6.65(ACGG.1)

ATP series: 4.32 - 5.37

USG FLEX series: 4.50 - 5.37

USG FLEX 50W: 4.16 - 5.37

USG20W-VPN: 4.16 - 5.37

VPN series: 4.30 - 5.37


External links
http://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability