CVE-2022-45439

A pair of spare WiFi credentials is stored in the configuration file of the Zyxel AX7501-B0 firmware prior to V5.17(ABPC.3)C0 in cleartext. An unauthenticated attacker could use the credentials to access the WLAN service if the configuration file has been retrieved from the device by leveraging another known vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zyxel:ax7501-b0_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:29

Type Values Removed Values Added
References () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-wifi-credentials-and-improper-symbolic-links-of-ftp-for-ax7501-b0-cpe - Vendor Advisory () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-wifi-credentials-and-improper-symbolic-links-of-ftp-for-ax7501-b0-cpe - Vendor Advisory
Summary
  • (es) Un par de credenciales WiFi de repuesto se almacenan en el archivo de configuración del firmware Zyxel AX7501-B0 anterior a V5.17(ABPC.3)C0 en texto plano. Un atacante no autenticado podría usar las credenciales para acceder al servicio WLAN si el archivo de configuración se recuperó del dispositivo aprovechando otra vulnerabilidad conocida.
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 5.3

Information

Published : 2023-01-17 02:15

Updated : 2024-11-21 07:29


NVD link : CVE-2022-45439

Mitre link : CVE-2022-45439

CVE.ORG link : CVE-2022-45439


JSON object : View

Products Affected

zyxel

  • ax7501-b0
  • ax7501-b0_firmware
CWE
CWE-312

Cleartext Storage of Sensitive Information