var-201512-0082
Vulnerability from variot
ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 are products of ZyXEL Technology. Both NBG-418N and P-660HW-T1 are wireless broadband routers; PMG5318-B20A is a wireless switch product. There are security vulnerabilities in several ZyXEL routers. A remote attacker could exploit this vulnerability to modify the system configuration. An insecure default-password vulnerability 2. Multiple cross-site scripting vulnerabilities 3. A command-execution vulnerability 4. A security-bypass vulnerability 5. An authorization-bypass Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions. There is a security vulnerability in ZyXEL P-660HW-T1 2 devices using ZyNOS 3.40(AXH.0) firmware, PMG5318-B20A devices and NBG-418N devices using 1.00AANC0b5 firmware. The vulnerability is caused by using '1234' as admin account password
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0082", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pmg5318-b20a", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": "v100aanc0b5" }, { "model": "nbg-418n", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "nbg-418n", "scope": null, "trust": 1.4, "vendor": "zyxel", "version": null }, { "model": "zynos", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": "3.40\\(axh.0\\)" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 v2", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "1.00aanc0b5" }, { "model": "zynos", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "3.40(axh.0) (2007 year 3 moon 30 day ) (p660hw-t1 v2)" }, { "model": "p-660hw-t1", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 2", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a v100aanc0b5", "scope": null, "trust": 0.3, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 3.40", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "v2" }, { "model": "nbg-418n", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "0" }, { "model": "pmg5318-b20a 1.00 c0", "scope": "ne", "trust": 0.3, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "CNNVD", "id": "CNNVD-201510-349" }, { "db": "NVD", "id": "CVE-2015-6016" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:zyxel:nbg-418n", "vulnerable": true }, { "cpe22Uri": "cpe:/h:zyxel:p-660hw-t1_v2", "vulnerable": true }, { "cpe22Uri": "cpe:/o:zyxel:pmg5318-b20a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:zyxel:zynos_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006593" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joel Land and Karn Ganeshen", "sources": [ { "db": "BID", "id": "77077" } ], "trust": 0.3 }, "cve": "CVE-2015-6016", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2015-6016", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2015-06900", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-83977", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2015-6016", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-6016", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2015-6016", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-06900", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201510-349", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-83977", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "CNNVD", "id": "CNNVD-201510-349" }, { "db": "NVD", "id": "CVE-2015-6016" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 are products of ZyXEL Technology. Both NBG-418N and P-660HW-T1 are wireless broadband routers; PMG5318-B20A is a wireless switch product. There are security vulnerabilities in several ZyXEL routers. A remote attacker could exploit this vulnerability to modify the system configuration. An insecure default-password vulnerability\n2. Multiple cross-site scripting vulnerabilities\n3. A command-execution vulnerability\n4. A security-bypass vulnerability\n5. An authorization-bypass\nSuccessful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions. There is a security vulnerability in ZyXEL P-660HW-T1 2 devices using ZyNOS 3.40(AXH.0) firmware, PMG5318-B20A devices and NBG-418N devices using 1.00AANC0b5 firmware. The vulnerability is caused by using \u00271234\u0027 as admin account password", "sources": [ { "db": "NVD", "id": "CVE-2015-6016" }, { "db": "CERT/CC", "id": "VU#870744" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "BID", "id": "77077" }, { "db": "VULHUB", "id": "VHN-83977" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#870744", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2015-6016", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034553", "trust": 1.1 }, { "db": "SECTRACK", "id": "1034552", "trust": 1.1 }, { "db": "SECTRACK", "id": "1034554", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU97093739", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006593", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201510-349", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-06900", "trust": 0.6 }, { "db": "BID", "id": "77077", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-83977", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "CNNVD", "id": "CNNVD-201510-349" }, { "db": "NVD", "id": "CVE-2015-6016" } ] }, "id": "VAR-201512-0082", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" } ], "trust": 1.2930356 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06900" } ] }, "last_update_date": "2024-11-23T22:31:02.132000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NBG-418N", "trust": 0.8, "url": "http://www.zyxel.com/support/SupportLandingSR.shtml?c=gb\u0026l=en\u0026kbid=M-01393\u0026md=NBG-418N" }, { "title": "PMG5318-B20A", "trust": 0.8, "url": "http://www.zyxel.com/support/SupportLandingSR.shtml?c=gb\u0026l=en\u0026kbid=M-01700\u0026md=PMG5318-B20A" }, { "title": "P-660HW-T1 v2", "trust": 0.8, "url": "http://www.zyxel.com/support/SupportLandingSR.shtml?c=gb\u0026l=en\u0026kbid=MD06084\u0026md=P-660HW-T1%20v2" }, { "title": "ZyXEL Support Center - Latest Release", "trust": 0.8, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "title": "DefaultPassword", "trust": 0.8, "url": "https://default-password.info/zyxel/" }, { "title": "Patches for multiple ZyXEL router credential management vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/65620" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83977" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "NVD", "id": "CVE-2015-6016" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.kb.cert.org/vuls/id/870744" }, { "trust": 1.9, "url": "https://www.kb.cert.org/vuls/id/bluu-9zqu2r" }, { "trust": 1.5, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034552" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034553" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034554" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6016" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97093739/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6016" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "CNNVD", "id": "CNNVD-201510-349" }, { "db": "NVD", "id": "CVE-2015-6016" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "CNNVD", "id": "CNNVD-201510-349" }, { "db": "NVD", "id": "CVE-2015-6016" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-13T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-06900" }, { "date": "2015-12-31T00:00:00", "db": "VULHUB", "id": "VHN-83977" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "date": "2015-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-349" }, { "date": "2015-12-31T05:59:14.833000", "db": "NVD", "id": "CVE-2015-6016" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-29T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-06900" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-83977" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "date": "2016-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-349" }, { "date": "2024-11-21T02:34:18.167000", "db": "NVD", "id": "CVE-2015-6016" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-349" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 routers contain multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#870744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-349" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.