CVE-2019-15802Hard-coded Credentials in Zyxel Gs1900-10hp Firmware

Severity
5.9MEDIUMNVD
EPSS
0.3%
top 49.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 14
Latest updateMay 24

Description

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) are used to encrypt and decrypt all passwords using AES256 in CBC mode. With the parameters known, all previously encrypted passwords can be decrypted. This includes the passwords that are part of configuration backups or otherwise embedded as part of

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages9 packages

NVDzyxel/gs1900-8_firmware< 2.50\(aahh.0\)c0
NVDzyxel/gs1900-16_firmware< 2.50\(aahj.0\)c0
NVDzyxel/gs1900-24_firmware< 2.50\(aahl.0\)c0
NVDzyxel/gs1900-48_firmware< 2.50\(aahn.0\)c0
NVDzyxel/gs1900-24e_firmware< 2.50\(aahk.0\)c0

🔴Vulnerability Details

2
GHSA
GHSA-fmpq-8rp4-f234: An issue was discovered on Zyxel GS1900 devices with firmware before 22022-05-24
CVEList
CVE-2019-15802: An issue was discovered on Zyxel GS1900 devices with firmware before 22019-11-14
CVE-2019-15802 — Hard-coded Credentials in Zyxel | cvebase