fkie_cve-2022-34746
Vulnerability from fkie_nvd
Published
2022-09-20 02:15
Modified
2024-11-21 07:10
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An insufficient entropy vulnerability caused by the improper use of randomness sources with low entropy for RSA key pair generation was found in Zyxel GS1900 series firmware versions prior to V2.70. This vulnerability could allow an unauthenticated attacker to retrieve a private key by factoring the RSA modulus N in the certificate of the web administration interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zyxel | gs1900-8_firmware | * | |
zyxel | gs1900-8 | - | |
zyxel | gs1900-8hp_firmware | * | |
zyxel | gs1900-8hp | - | |
zyxel | gs1900-10hp_firmware | * | |
zyxel | gs1900-10hp | - | |
zyxel | gs1900-16_firmware | * | |
zyxel | gs1900-16 | - | |
zyxel | gs1900-24_firmware | * | |
zyxel | gs1900-24 | - | |
zyxel | gs1900-24e_firmware | * | |
zyxel | gs1900-24e | - | |
zyxel | gs1900-24ep_firmware | * | |
zyxel | gs1900-24ep | - | |
zyxel | gs1900-24hpv2_firmware | * | |
zyxel | gs1900-24hpv2 | - | |
zyxel | gs1900-48_firmware | * | |
zyxel | gs1900-48 | - | |
zyxel | gs1900-48hpv2_firmware | * | |
zyxel | gs1900-48hpv2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8C89E9-1F95-41E8-9E03-ACF475F2D2D0", "versionEndExcluding": "2.70\\(aahh.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D33F50-B5A4-4AEF-972C-7FF089C21D52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "309B1AEB-4154-42A1-B892-EC511A3C03F0", "versionEndExcluding": "2.70\\(aahi.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "27602862-EFB7-402B-994E-254A0B210820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BDB45D9-2EF6-41FC-94A4-FFE7D3105C43", "versionEndExcluding": "2.70\\(aazi.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "89201505-07AF-4F9C-9304-46F2707DB9B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FC381F1-041B-4634-9F67-698E29037955", "versionEndExcluding": "2.70\\(aahj.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B87441A-7C43-4B63-99D5-BA70364F062D", "versionEndExcluding": "2.70\\(aahl.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F55299-70D5-4CE1-A1EC-D79B469B94F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1AF52CD-C62F-41C5-89BB-253A6F5C3624", "versionEndExcluding": "2.70\\(aahk.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EEEAB28-5FE5-42E4-88E6-9BCDA03B9420", "versionEndExcluding": "2.70\\(abto.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1841493A-E849-413B-B39D-77A8E940B138", "versionEndExcluding": "2.70\\(abtp.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "512D9A91-8DA7-47F1-AC77-AF743F99BFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17331D45-94BA-489F-BA8A-53F72026244C", "versionEndExcluding": "2.70\\(aahn.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A2CB26-844A-41ED-A59A-E67ACD371DCA", "versionEndExcluding": "2.70\\(abtq.3\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC74C679-6D22-47E4-AE8A-2647B1AA4276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insufficient entropy vulnerability caused by the improper use of randomness sources with low entropy for RSA key pair generation was found in Zyxel GS1900 series firmware versions prior to V2.70. This vulnerability could allow an unauthenticated attacker to retrieve a private key by factoring the RSA modulus N in the certificate of the web administration interface." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad de entrop\u00eda insuficiente causada por el uso inapropiado de fuentes de aleatoriedad con baja entrop\u00eda para la generaci\u00f3n de pares de claves RSA en las versiones de firmware de la serie Zyxel GS1900 versiones anteriores a V2.70. Esta vulnerabilidad podr\u00eda permitir a un atacante no autenticado recuperar una clave privada mediante la factorizaci\u00f3n del m\u00f3dulo N de RSA en el certificado de la interfaz de administraci\u00f3n web" } ], "id": "CVE-2022-34746", "lastModified": "2024-11-21T07:10:06.513", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-20T02:15:08.640", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-331" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-331" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.