12 results (0.012 seconds)

CVSS: 5.5EPSS: 0%CPEs: 20EXPL: 0

The improper privilege management vulnerability in the Zyxel GS1900-24EP switch firmware version V2.70(ABTO.5) could allow an authenticated local user with read-only access to modify system settings on a vulnerable device. La vulnerabilidad de administración de privilegios inadecuada en Zyxel GS1900-24EP switch firmware versión V2.70 (ABTO.5) podría permitir que un usuario local autenticado con acceso de solo lectura modifique la configuración del sistema en un dispositivo vulnerable. • https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-improper-privilege-management-vulnerability-in-gs1900-series-switches • CWE-269: Improper Privilege Management •

CVSS: 6.7EPSS: 0%CPEs: 20EXPL: 0

The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version V2.70(AAHH.3) and the GS1900-8HP firmware version V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as 'root' on a vulnerable device via SSH. • https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-privilege-escalation-vulnerability-in-gs1900-series-switches • CWE-269: Improper Privilege Management •

CVSS: 5.9EPSS: 0%CPEs: 20EXPL: 0

An insufficient entropy vulnerability caused by the improper use of randomness sources with low entropy for RSA key pair generation was found in Zyxel GS1900 series firmware versions prior to V2.70. This vulnerability could allow an unauthenticated attacker to retrieve a private key by factoring the RSA modulus N in the certificate of the web administration interface. Se ha encontrado una vulnerabilidad de entropía insuficiente causada por el uso inapropiado de fuentes de aleatoriedad con baja entropía para la generación de pares de claves RSA en las versiones de firmware de la serie Zyxel GS1900 versiones anteriores a V2.70. Esta vulnerabilidad podría permitir a un atacante no autenticado recuperar una clave privada mediante la factorización del módulo N de RSA en el certificado de la interfaz de administración web • https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-insufficient-entropy-vulnerability-of-gs1900-series-switches • CWE-331: Insufficient Entropy •

CVSS: 7.8EPSS: 0%CPEs: 24EXPL: 0

A vulnerability in the 'libsal.so' of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call. Una vulnerabilidad en el archivo "libsal.so" del firmware de la serie Zyxel GS1900 versión 2.60, podría permitir a un usuario local autenticado ejecutar comandos arbitrarios del sistema operativo por medio de una llamada de función diseñada • https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.0EPSS: 0%CPEs: 28EXPL: 0

A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device. Una vulnerabilidad en el cliente TFTP del firmware de la serie Zyxel GS1900 versión 2.60, podría permitir a un usuario local autenticado ejecutar comandos arbitrarios del SO • https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •