The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version
V2.70(AAHH.3) and the GS1900-8HP firmware version V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as 'root' on a vulnerable device via SSH.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
06 Jun 2023, 21:08
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Zyxel gs1900-48
Zyxel gs1900-24 Firmware Zyxel gs1900-48hpv2 Firmware Zyxel gs1900-10hp Firmware Zyxel gs1900-8hp Firmware Zyxel gs1900-24ep Firmware Zyxel gs1900-24ep Zyxel gs1900-48 Firmware Zyxel Zyxel gs1900-8hp Zyxel gs1900-24hpv2 Firmware Zyxel gs1900-16 Zyxel gs1900-48hpv2 Zyxel gs1900-10hp Zyxel gs1900-24 Zyxel gs1900-8 Zyxel gs1900-16 Firmware Zyxel gs1900-8 Firmware Zyxel gs1900-24e Firmware Zyxel gs1900-24e Zyxel gs1900-24hpv2 |
|
References | (MISC) https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-privilege-escalation-vulnerability-in-gs1900-series-switches - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
CPE | cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:2.70\(abtq.3\):*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24e_firmware:2.70\(aahk.3\):*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:2.70\(abtp.3\):*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24_firmware:2.70\(aahl.3\):*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24ep_firmware:2.70\(abto.3\):*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-48_firmware:2.70\(aahn.3\):*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-8_firmware:2.70\(aahh.3\):*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-10hp_firmware:2.70\(aazi.3\):*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-16_firmware:2.70\(aahj.3\):*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-8hp_firmware:2.70\(aahi.3\):*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:* |
06 Jun 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version V2.70(AAHH.3) and the GS1900-8HP firmware version V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as 'root' on a vulnerable device via SSH. | |
References |
|
05 Jun 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** REJECT ** The privilege escalation vulnerability in the Zyxel GS1900-8HP firmware version V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as the “root” user on a vulnerable device via SSH. |
30 May 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-30 11:15
Updated : 2024-02-28 20:13
NVD link : CVE-2022-45853
Mitre link : CVE-2022-45853
CVE.ORG link : CVE-2022-45853
JSON object : View
Products Affected
zyxel
- gs1900-10hp_firmware
- gs1900-48hpv2
- gs1900-8hp_firmware
- gs1900-24
- gs1900-24e_firmware
- gs1900-8hp
- gs1900-24hpv2
- gs1900-24hpv2_firmware
- gs1900-16
- gs1900-16_firmware
- gs1900-24e
- gs1900-24ep_firmware
- gs1900-10hp
- gs1900-8
- gs1900-8_firmware
- gs1900-48_firmware
- gs1900-48
- gs1900-24ep
- gs1900-24_firmware
- gs1900-48hpv2_firmware
CWE