ID

VAR-201512-0093


CVE

CVE-2015-7283


TITLE

ZyXEL NBG-418N router uses default credentials and is vulnerable to cross-site request forgery

Trust: 0.8

sources: CERT/CC: VU#330000

DESCRIPTION

The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. ZyXEL NBG-418N router, firmware version 1.00(AADZ.3)C0, uses default credentials and is vulnerable to cross-site request forgery. ZyXELNBG-418N is a wireless broadband router from ZyXEL Technology. ZyXELNBG-418Ndeviceswithfirmware1.00(AADZ.3)C0 has a credential management vulnerability. An attacker can exploit these issues to gain unauthorized access, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker's behalf using a victim's currently active session. The vulnerability is caused by using '1234' as the password for the admin account

Trust: 3.24

sources: NVD: CVE-2015-7283 // CERT/CC: VU#330000 // JVNDB: JVNDB-2015-006554 // CNVD: CNVD-2016-00152 // BID: 78819 // VULHUB: VHN-85244

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-00152

AFFECTED PRODUCTS

vendor:zyxelmodel:nbg-418nscope:eqversion:1.00\(aadz.3\)c0

Trust: 1.6

vendor:zyxelmodel: - scope: - version: -

Trust: 0.8

vendor:zyxelmodel:nbg-418nscope: - version: -

Trust: 0.8

vendor:zyxelmodel:nbg-418nscope:eqversion:1.00(aadz.3)c0

Trust: 0.8

vendor:zyxelmodel:nbg-418n devices with 1.00 c0scope: - version: -

Trust: 0.6

sources: CERT/CC: VU#330000 // CNVD: CNVD-2016-00152 // JVNDB: JVNDB-2015-006554 // CNNVD: CNNVD-201512-314 // NVD: CVE-2015-7283

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7283
value: HIGH

Trust: 1.0

NVD: CVE-2015-7283
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-00152
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201512-314
value: CRITICAL

Trust: 0.6

VULHUB: VHN-85244
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-7283
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-00152
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-85244
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-7283
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-00152 // VULHUB: VHN-85244 // JVNDB: JVNDB-2015-006554 // CNNVD: CNNVD-201512-314 // NVD: CVE-2015-7283

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-85244 // JVNDB: JVNDB-2015-006554 // NVD: CVE-2015-7283

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201512-314

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201512-314

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006554

PATCH

title:Download Libraryurl:http://www.zyxel.com/us/en/support/download_library/product/nbg_418n_7.shtml?c=us&l=en&pid=20120320173444&tab=Firmware

Trust: 0.8

sources: JVNDB: JVNDB-2015-006554

EXTERNAL IDS

db:CERT/CCid:VU#330000

Trust: 4.2

db:NVDid:CVE-2015-7283

Trust: 3.4

db:BIDid:78819

Trust: 2.0

db:SECTRACKid:1034554

Trust: 1.1

db:JVNid:JVNVU90501820

Trust: 0.8

db:JVNDBid:JVNDB-2015-006554

Trust: 0.8

db:CNNVDid:CNNVD-201512-314

Trust: 0.7

db:CNVDid:CNVD-2016-00152

Trust: 0.6

db:VULHUBid:VHN-85244

Trust: 0.1

sources: CERT/CC: VU#330000 // CNVD: CNVD-2016-00152 // VULHUB: VHN-85244 // BID: 78819 // JVNDB: JVNDB-2015-006554 // CNNVD: CNNVD-201512-314 // NVD: CVE-2015-7283

REFERENCES

url:https://www.kb.cert.org/vuls/id/330000

Trust: 3.4

url:http://www.securityfocus.com/bid/78819

Trust: 1.7

url:http://www.securitytracker.com/id/1034554

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7283

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90501820/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7283

Trust: 0.8

url:http://www.zyxel.com/th/th/

Trust: 0.3

sources: CERT/CC: VU#330000 // CNVD: CNVD-2016-00152 // VULHUB: VHN-85244 // BID: 78819 // JVNDB: JVNDB-2015-006554 // CNNVD: CNNVD-201512-314 // NVD: CVE-2015-7283

CREDITS

Joel Land of the CERT/CC

Trust: 0.9

sources: BID: 78819 // CNNVD: CNNVD-201512-314

SOURCES

db:CERT/CCid:VU#330000
db:CNVDid:CNVD-2016-00152
db:VULHUBid:VHN-85244
db:BIDid:78819
db:JVNDBid:JVNDB-2015-006554
db:CNNVDid:CNNVD-201512-314
db:NVDid:CVE-2015-7283

LAST UPDATE DATE

2024-11-23T22:31:02.093000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#330000date:2015-12-10T00:00:00
db:CNVDid:CNVD-2016-00152date:2016-01-12T00:00:00
db:VULHUBid:VHN-85244date:2016-12-07T00:00:00
db:BIDid:78819date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006554date:2016-01-04T00:00:00
db:CNNVDid:CNNVD-201512-314date:2016-01-04T00:00:00
db:NVDid:CVE-2015-7283date:2024-11-21T02:36:30.680

SOURCES RELEASE DATE

db:CERT/CCid:VU#330000date:2015-12-10T00:00:00
db:CNVDid:CNVD-2016-00152date:2016-01-12T00:00:00
db:VULHUBid:VHN-85244date:2015-12-31T00:00:00
db:BIDid:78819date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006554date:2016-01-04T00:00:00
db:CNNVDid:CNNVD-201512-314date:2015-12-11T00:00:00
db:NVDid:CVE-2015-7283date:2015-12-31T05:59:25.260