zyxel nbg6818_firmware 不充分的凭证保护机制
CVE编号
CVE-2021-35033利用情况
暂无补丁情况
N/A披露时间
2021-11-24漏洞描述
A vulnerability in specific versions of Zyxel NBG6818, NBG7815, WSQ20, WSQ50, WSQ60, and WSR30 firmware with pre-configured password management could allow an attacker to obtain root access of the device, if the local attacker dismantles the device and uses a USB-to-UART cable to connect the device, or if the remote assistance feature had been enabled by an authenticated user.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://www.tenable.com/security/research/tra-2022-06 | |
https://www.zyxel.com/support/Zyxel_security_advisory_for_pre-configured_pass... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | zyxel | nbg6818_firmware | * | Up to (excluding) 1.00\(absc.5\)c0 | |||||
运行在以下环境 | |||||||||
系统 | zyxel | nbg7815_firmware | * | Up to (excluding) 1.00\(absk.7\)c0 | |||||
运行在以下环境 | |||||||||
系统 | zyxel | wsq20_firmware | * | Up to (excluding) 1.00\(abof.11\)c0 | |||||
运行在以下环境 | |||||||||
系统 | zyxel | wsq50_firmware | * | Up to (excluding) 2.20\(abkj.7\)c0 | |||||
运行在以下环境 | |||||||||
系统 | zyxel | wsq60_firmware | * | Up to (excluding) 2.20\(abnd.8\)c0 | |||||
运行在以下环境 | |||||||||
系统 | zyxel | wsr30_firmware | * | Up to (excluding) 1.00\(abmy.12\)c0 | |||||
运行在以下环境 | |||||||||
硬件 | zyxel | nbg6818 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | zyxel | nbg7815 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | zyxel | wsq20 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | zyxel | wsq50 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | zyxel | wsq60 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | zyxel | wsr30 | - | - | |||||
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-287 | 认证机制不恰当 |
CWE-522 | 不充分的凭证保护机制 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论