CVE-2020-29583
CVE Published | 2020-12-22 |
---|---|
Related CWE(s) | CWE-522: Insufficiently Protected Credentials |
Related Vendor(s) | zyxel |
Related Product(s) | usg_flex_100w_firmware, usg60w_firmware, vpn1000_firmware, usg210_firmware, usg40w_firmware, usg_flex_700_firmware, usg60_firmware, atp700_firmware, vpn300_firmware, usg110_firmware, zywall310_firmware, usg310_firmware, usg20-vpn_firmware, usg20w-vpn_firmware, atp100_firmware, usg1900_firmware, vpn100_firmware, usg_flex_200_firmware, usg1100_firmware, usg_flex_100_firmware, atp500_firmware, zywall1100_firmware, usg40_firmware, atp100w_firmware, usg_flex_500_firmware, atp200_firmware, vpn50_firmware, usg2200_firmware, atp800_firmware, zywall110_firmware |
Exploitation Reported (CISA KEV) | 2021-11-03 |
CVSS 3 Base Score | 9.8 (CRITICAL) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | NETWORK |
Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server or web interface with admin privileges.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph