ID

VAR-202107-0888


CVE

CVE-2021-35029


TITLE

plural  Zyxel  Firmware authentication vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-008898

DESCRIPTION

An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device. plural Zyxel There is an authentication vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.71

sources: NVD: CVE-2021-35029 // JVNDB: JVNDB-2021-008898 // VULMON: CVE-2021-35029

AFFECTED PRODUCTS

vendor:zyxelmodel:usg310scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg310scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg flex 100scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg flex 200scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg flex 700scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:zywall atp100wscope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:zywall atp100wscope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg flex 100scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg flex 700scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg60wscope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:zywall atp100scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall vpn300scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg20w-vpnscope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg2200-vpnscope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:zywall 110scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg100scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg60wscope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall atp100scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg2200-vpnscope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg100scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg300scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg flex 200scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg110scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg40scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg40wscope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:zywall vpn50scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:zywall atp200scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall 1100scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg300scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg1000scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall vpn300scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall 110scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg110scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg1100scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg1000scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg40wscope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg40scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall atp200scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg1100scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:zywall atp700scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:zywall atp800scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall atp800scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:zywall vpn50scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall 1100scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg200scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg200scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:zywall atp700scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg60scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg1900scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg60scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg20wscope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:zywall atp500scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg20-vpnscope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg flex 500scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall atp500scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg20-vpnscope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg1900scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg210scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg20wscope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg20scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg50scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg flex 500scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg210scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg50scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:zywall vpn100scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg flex 100wscope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall vpn100scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:zywall 310scope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg flex 100wscope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:zywall 310scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg2000scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg20scope:gteversion:4.35

Trust: 1.0

vendor:zyxelmodel:usg20w-vpnscope:lteversion:5.01

Trust: 1.0

vendor:zyxelmodel:usg2000scope:lteversion:4.64

Trust: 1.0

vendor:zyxelmodel:usg210scope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg1900scope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg40scope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg60scope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg40wscope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg110scope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg300scope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg310scope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg60wscope: - version: -

Trust: 0.8

vendor:zyxelmodel:usg1100scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-008898 // NVD: CVE-2021-35029

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-35029
value: CRITICAL

Trust: 1.0

security@zyxel.com.tw: CVE-2021-35029
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-35029
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202107-147
value: CRITICAL

Trust: 0.6

VULMON: CVE-2021-35029
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-35029
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-35029
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-008898
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-35029 // JVNDB: JVNDB-2021-008898 // CNNVD: CNNVD-202107-147 // NVD: CVE-2021-35029 // NVD: CVE-2021-35029

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.0

problemtype:Improper authentication (CWE-287) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-008898 // NVD: CVE-2021-35029

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202107-147

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202107-147

PATCH

title:Zyxel security advisory for attacks against security appliancesurl:https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml

Trust: 0.8

title:ZyXEL ZyWALL USG Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155962

Trust: 0.6

sources: JVNDB: JVNDB-2021-008898 // CNNVD: CNNVD-202107-147

EXTERNAL IDS

db:NVDid:CVE-2021-35029

Trust: 3.3

db:JVNDBid:JVNDB-2021-008898

Trust: 0.8

db:CNNVDid:CNNVD-202107-147

Trust: 0.6

db:VULMONid:CVE-2021-35029

Trust: 0.1

sources: VULMON: CVE-2021-35029 // JVNDB: JVNDB-2021-008898 // CNNVD: CNNVD-202107-147 // NVD: CVE-2021-35029

REFERENCES

url:https://www.zyxel.com/support/zyxel_security_advisory_for_attacks_against_security_appliances.shtml

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-35029

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-35029 // JVNDB: JVNDB-2021-008898 // CNNVD: CNNVD-202107-147 // NVD: CVE-2021-35029

SOURCES

db:VULMONid:CVE-2021-35029
db:JVNDBid:JVNDB-2021-008898
db:CNNVDid:CNNVD-202107-147
db:NVDid:CVE-2021-35029

LAST UPDATE DATE

2024-08-14T15:38:00.341000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-35029date:2021-07-08T00:00:00
db:JVNDBid:JVNDB-2021-008898date:2022-03-31T04:46:00
db:CNNVDid:CNNVD-202107-147date:2021-07-09T00:00:00
db:NVDid:CVE-2021-35029date:2021-07-08T18:20:48.127

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-35029date:2021-07-02T00:00:00
db:JVNDBid:JVNDB-2021-008898date:2022-03-31T00:00:00
db:CNNVDid:CNNVD-202107-147date:2021-07-02T00:00:00
db:NVDid:CVE-2021-35029date:2021-07-02T11:15:08.930