Vulnerability Description
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted passwords for all users on the device. As these passwords are encrypted using well-known and static parameters, they can be decrypted and the original passwords (including the administrator password) can be obtained.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zyxel | Gs1900-8 Firmware | < 2.50\(aahh.0\)c0 |
| Zyxel | Gs1900-8 | - |
| Zyxel | Gs1900-8Hp Firmware | < 2.50\(aahi.0\)c0 |
| Zyxel | Gs1900-8Hp | - |
| Zyxel | Gs1900-10Hp Firmware | < 2.50\(aazi.0\)c0 |
| Zyxel | Gs1900-10Hp | - |
| Zyxel | Gs1900-16 Firmware | < 2.50\(aahj.0\)c0 |
| Zyxel | Gs1900-16 | - |
| Zyxel | Gs1900-24E Firmware | < 2.50\(aahk.0\)c0 |
| Zyxel | Gs1900-24E | - |
| Zyxel | Gs1900-24 Firmware | < 2.50\(aahl.0\)c0 |
| Zyxel | Gs1900-24 | - |
| Zyxel | Gs1900-24Hp Firmware | < 2.50\(aahm.0\)c0 |
| Zyxel | Gs1900-24Hp | - |
| Zyxel | Gs1900-48 Firmware | < 2.50\(aahn.0\)c0 |
| Zyxel | Gs1900-48 | - |
| Zyxel | Gs1900-48Hp Firmware | < 2.50\(aaho.0\)c0 |
| Zyxel | Gs1900-48Hp | - |
Related Weaknesses (CWE)
References
- https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.htmlExploitThird Party Advisory
- https://vimeo.com/354726424ExploitThird Party Advisory
- https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtmlVendor Advisory
- https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.htmlExploitThird Party Advisory
- https://vimeo.com/354726424ExploitThird Party Advisory
- https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtmlVendor Advisory
FAQ
What is CVE-2019-15799?
CVE-2019-15799 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same...
How severe is CVE-2019-15799?
CVE-2019-15799 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15799?
Check the references section above for vendor advisories and patch information. Affected products include: Zyxel Gs1900-8 Firmware, Zyxel Gs1900-8, Zyxel Gs1900-8Hp Firmware, Zyxel Gs1900-8Hp, Zyxel Gs1900-10Hp Firmware.