CVE-2019-15804

3 documents3 sources
Severity
7.5HIGH
EPSS
0.2%
top 52.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 14
Latest updateMay 24

Description

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages9 packages

NVDzyxel/gs1900-8_firmware< 2.50\(aahh.0\)c0
NVDzyxel/gs1900-16_firmware< 2.50\(aahj.0\)c0
NVDzyxel/gs1900-24_firmware< 2.50\(aahl.0\)c0
NVDzyxel/gs1900-48_firmware< 2.50\(aahn.0\)c0
NVDzyxel/gs1900-24e_firmware< 2.50\(aahk.0\)c0

🔴Vulnerability Details

2
GHSA
GHSA-f7fc-w7v7-g3q3: An issue was discovered on Zyxel GS1900 devices with firmware before 22022-05-24
CVEList
CVE-2019-15804: An issue was discovered on Zyxel GS1900 devices with firmware before 22019-11-14