ID

VAR-201905-0654


CVE

CVE-2017-18371


TITLE

ZyXEL P660HN-T1A v2 Vulnerabilities related to the use of hard-coded credentials in routers

Trust: 0.8

sources: JVNDB: JVNDB-2017-014436

DESCRIPTION

The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes. ZyXEL P660HN-T1A v2 The router contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZyXEL P660HN-T1A is a wireless router made by ZyXEL, Taiwan, China. There is a trust management issue vulnerability in ZyXEL P660HN-T1A (hardware 2 version, TrueOnline firmware 200AAJS3D0 version). This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components

Trust: 1.8

sources: NVD: CVE-2017-18371 // JVNDB: JVNDB-2017-014436 // VULHUB: VHN-109487 // VULMON: CVE-2017-18371

AFFECTED PRODUCTS

vendor:zyxelmodel:p660hn-t1a v1scope:eqversion:7.3.37.6

Trust: 1.0

vendor:zyxelmodel:p660hn-t1a v2scope:eqversion:7.3.37.6

Trust: 1.0

vendor:billionmodel:5200w-tscope:eqversion:7.3.8.0

Trust: 1.0

vendor:billionmodel:5200w-tscope: - version: -

Trust: 0.8

vendor:zyxelmodel:p660hn-t1a v1scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p660hn-t1a v2scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2017-014436 // NVD: CVE-2017-18371

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-18371
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-18371
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201905-076
value: CRITICAL

Trust: 0.6

VULHUB: VHN-109487
value: HIGH

Trust: 0.1

VULMON: CVE-2017-18371
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-18371
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-109487
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-18371
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-109487 // VULMON: CVE-2017-18371 // JVNDB: JVNDB-2017-014436 // CNNVD: CNNVD-201905-076 // NVD: CVE-2017-18371

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-109487 // JVNDB: JVNDB-2017-014436 // NVD: CVE-2017-18371

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-076

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201905-076

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014436

PATCH

title:Top Pageurl:http://www.billion.com.tw/index.aspx

Trust: 0.8

title:Top Pageurl:https://www.zyxel.com/homepage.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2017-014436

EXTERNAL IDS

db:NVDid:CVE-2017-18371

Trust: 2.6

db:JVNDBid:JVNDB-2017-014436

Trust: 0.8

db:CNNVDid:CNNVD-201905-076

Trust: 0.7

db:VULHUBid:VHN-109487

Trust: 0.1

db:VULMONid:CVE-2017-18371

Trust: 0.1

sources: VULHUB: VHN-109487 // VULMON: CVE-2017-18371 // JVNDB: JVNDB-2017-014436 // CNNVD: CNNVD-201905-076 // NVD: CVE-2017-18371

REFERENCES

url:https://seclists.org/fulldisclosure/2017/jan/40

Trust: 2.6

url:http://www.zyxel.com/support/announcement_unauthenticated.shtml

Trust: 1.8

url:https://raw.githubusercontent.com/pedrib/poc/master/advisories/zyxel_trueonline.txt

Trust: 1.8

url:https://ssd-disclosure.com/index.php/archives/2910

Trust: 1.8

url:https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-18371

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18371

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/798.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-109487 // VULMON: CVE-2017-18371 // JVNDB: JVNDB-2017-014436 // CNNVD: CNNVD-201905-076 // NVD: CVE-2017-18371

SOURCES

db:VULHUBid:VHN-109487
db:VULMONid:CVE-2017-18371
db:JVNDBid:JVNDB-2017-014436
db:CNNVDid:CNNVD-201905-076
db:NVDid:CVE-2017-18371

LAST UPDATE DATE

2024-11-23T22:30:02.189000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-109487date:2019-05-03T00:00:00
db:VULMONid:CVE-2017-18371date:2019-05-03T00:00:00
db:JVNDBid:JVNDB-2017-014436date:2019-05-24T00:00:00
db:CNNVDid:CNNVD-201905-076date:2019-05-09T00:00:00
db:NVDid:CVE-2017-18371date:2024-11-21T03:19:57.370

SOURCES RELEASE DATE

db:VULHUBid:VHN-109487date:2019-05-02T00:00:00
db:VULMONid:CVE-2017-18371date:2019-05-02T00:00:00
db:JVNDBid:JVNDB-2017-014436date:2019-05-24T00:00:00
db:CNNVDid:CNNVD-201905-076date:2019-05-02T00:00:00
db:NVDid:CVE-2017-18371date:2019-05-02T17:29:01.067