CVE-2019-15799
Summary
| CVE | CVE-2019-15799 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-11-14 21:15:00 UTC |
| Updated | 2019-11-21 18:15:00 UTC |
| Description | An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted passwords for all users on the device. As these passwords are encrypted using well-known and static parameters, they can be decrypted and the original passwords (including the administrator password) can be obtained. |
Risk And Classification
Problem Types: CWE-269
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Zyxel | Gs1900-10hp | - | All | All | All |
| Hardware | Zyxel | Gs1900-10hp | - | All | All | All |
| Operating System | Zyxel | Gs1900-10hp Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-10hp Firmware | All | All | All | All |
| Hardware | Zyxel | Gs1900-16 | - | All | All | All |
| Hardware | Zyxel | Gs1900-16 | - | All | All | All |
| Operating System | Zyxel | Gs1900-16 Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-16 Firmware | All | All | All | All |
| Hardware | Zyxel | Gs1900-24 | - | All | All | All |
| Hardware | Zyxel | Gs1900-24 | - | All | All | All |
| Hardware | Zyxel | Gs1900-24e | - | All | All | All |
| Hardware | Zyxel | Gs1900-24e | - | All | All | All |
| Operating System | Zyxel | Gs1900-24e Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-24e Firmware | All | All | All | All |
| Hardware | Zyxel | Gs1900-24hp | - | All | All | All |
| Hardware | Zyxel | Gs1900-24hp | - | All | All | All |
| Operating System | Zyxel | Gs1900-24hp Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-24hp Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-24 Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-24 Firmware | All | All | All | All |
| Hardware | Zyxel | Gs1900-48 | - | All | All | All |
| Hardware | Zyxel | Gs1900-48 | - | All | All | All |
| Hardware | Zyxel | Gs1900-48hp | - | All | All | All |
| Hardware | Zyxel | Gs1900-48hp | - | All | All | All |
| Operating System | Zyxel | Gs1900-48hp Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-48hp Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-48 Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-48 Firmware | All | All | All | All |
| Hardware | Zyxel | Gs1900-8 | - | All | All | All |
| Hardware | Zyxel | Gs1900-8 | - | All | All | All |
| Hardware | Zyxel | Gs1900-8hp | - | All | All | All |
| Hardware | Zyxel | Gs1900-8hp | - | All | All | All |
| Operating System | Zyxel | Gs1900-8hp Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-8hp Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-8 Firmware | All | All | All | All |
| Operating System | Zyxel | Gs1900-8 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Exploring Zyxel GS1900 firmware with Ghidra - [ jasper.la ] | MISC | jasper.la | Exploit, Third Party Advisory |
| Zyxel security advisory for GS1900 switch vulnerabilities | Zyxel | CONFIRM | www.zyxel.com | Vendor Advisory |
| Zyxel GS1900 administrative access vulnerability (CVE-2019-15799) on Vimeo | MISC | vimeo.com | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.