CVE-2020-13364
Summary
| CVE | CVE-2020-13364 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-08-06 17:15:00 UTC |
| Updated | 2022-02-09 16:51:00 UTC |
| Description | A backdoor in certain Zyxel products allows remote TELNET access via a CGI script. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Zyxel | Nas326 | - | All | All | All |
| Operating System | Zyxel | Nas326 Firmware | All | All | All | All |
| Hardware | Zyxel | Nas520 | - | All | All | All |
| Operating System | Zyxel | Nas520 Firmware | All | All | All | All |
| Hardware | Zyxel | Nas540 | - | All | All | All |
| Operating System | Zyxel | Nas540 Firmware | All | All | All | All |
| Hardware | Zyxel | Nas542 | - | All | All | All |
| Operating System | Zyxel | Nas542 Firmware | All | All | All | All |
| Hardware | Zyzel | Nas326 | - | All | All | All |
| Hardware | Zyzel | Nas326 | - | All | All | All |
| Operating System | Zyzel | Nas326 Firmware | All | All | All | All |
| Operating System | Zyzel | Nas326 Firmware | All | All | All | All |
| Hardware | Zyzel | Nas520 | - | All | All | All |
| Hardware | Zyzel | Nas520 | - | All | All | All |
| Operating System | Zyzel | Nas520 Firmware | All | All | All | All |
| Operating System | Zyzel | Nas520 Firmware | All | All | All | All |
| Hardware | Zyzel | Nas540 | - | All | All | All |
| Hardware | Zyzel | Nas540 | - | All | All | All |
| Operating System | Zyzel | Nas540 Firmware | All | All | All | All |
| Operating System | Zyzel | Nas540 Firmware | All | All | All | All |
| Hardware | Zyzel | Nas542 | - | All | All | All |
| Hardware | Zyzel | Nas542 | - | All | All | All |
| Operating System | Zyzel | Nas542 Firmware | All | All | All | All |
| Operating System | Zyzel | Nas542 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Zyxel security advisory for NAS remote access vulnerability | Zyxel | MISC | www.zyxel.com | Vendor Advisory |
| Security Advisories | Zyxel | MISC | www.zyxel.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.