2023-05-30 12:00:27 +00:00
{
"id" : "CVE-2022-45853" ,
"sourceIdentifier" : "security@zyxel.com.tw" ,
"published" : "2023-05-30T11:15:09.237" ,
2025-01-10 19:03:46 +00:00
"lastModified" : "2025-01-10T18:15:14.623" ,
2024-12-08 03:06:42 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-05-30 12:00:27 +00:00
"descriptions" : [
{
"lang" : "en" ,
2023-06-09 11:28:17 +00:00
"value" : "The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version \n\nV2.70(AAHH.3)\u00a0and the GS1900-8HP firmware version\u00a0V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as 'root' on a vulnerable device via SSH."
2023-05-30 12:00:27 +00:00
}
] ,
2023-06-09 11:28:17 +00:00
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "security@zyxel.com.tw" ,
"type" : "Secondary" ,
2023-06-09 11:28:17 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.7 ,
"baseSeverity" : "MEDIUM" ,
2023-06-09 11:28:17 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-06-09 11:28:17 +00:00
} ,
"exploitabilityScore" : 0.8 ,
"impactScore" : 5.9
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-06-09 11:28:17 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.7 ,
"baseSeverity" : "MEDIUM" ,
2023-06-09 11:28:17 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-06-09 11:28:17 +00:00
} ,
"exploitabilityScore" : 0.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
2024-12-08 03:06:42 +00:00
"source" : "security@zyxel.com.tw" ,
2025-01-10 19:03:46 +00:00
"type" : "Primary" ,
2023-06-09 11:28:17 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-269"
2023-06-09 11:28:17 +00:00
}
]
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
2025-01-10 19:03:46 +00:00
"type" : "Secondary" ,
2023-06-09 11:28:17 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "NVD-CWE-noinfo"
2023-06-09 11:28:17 +00:00
}
]
2025-01-10 19:03:46 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-276"
}
]
2023-06-09 11:28:17 +00:00
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-8_firmware:2.70\\(aahh.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "527D0BFB-F841-4DCE-8E00-16323FC46996"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51D33F50-B5A4-4AEF-972C-7FF089C21D52"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-8hp_firmware:2.70\\(aahi.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AA6A7D0-96D8-4949-8DD8-47EE58E2ECE0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27602862-EFB7-402B-994E-254A0B210820"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-10hp_firmware:2.70\\(aazi.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2C468E7-4D3F-4BDB-9CAE-A63D2A931E04"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "89201505-07AF-4F9C-9304-46F2707DB9B4"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-16_firmware:2.70\\(aahj.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D131CC71-786E-435A-8D38-AEEEC2550EEF"
2023-06-09 11:28:17 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5078F7A5-D03B-4D3A-9C19-57DFF4D6BF7A"
2023-06-09 11:28:17 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-24_firmware:2.70\\(aahl.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1A4D69A3-AD61-4FCA-B413-916ABFE1947E"
2023-06-09 11:28:17 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4F55299-70D5-4CE1-A1EC-D79B469B94F7"
2023-06-09 11:28:17 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-24e_firmware:2.70\\(aahk.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2160CDCE-C645-4AEF-9197-54172C0BBE9A"
2023-06-09 11:28:17 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6456AD6-8A1D-4D3D-AC1A-ABE442242B1B"
2023-06-09 11:28:17 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-24ep_firmware:2.70\\(abto.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DD99781-1BB0-40E0-A5AE-3529F2C47042"
2023-06-09 11:28:17 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B22AA8B1-11E2-408F-A1F6-0F8AF32AB131"
2023-06-09 11:28:17 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:2.70\\(abtp.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B528417-3E19-4E00-A682-AFCD87D96D8B"
2023-06-09 11:28:17 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "512D9A91-8DA7-47F1-AC77-AF743F99BFF3"
2023-06-09 11:28:17 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-48_firmware:2.70\\(aahn.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4B3AE8C-CDC7-45F3-97CA-F5C2EE6B9D03"
2023-06-09 11:28:17 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFB7D4BF-7D17-48D3-990D-4BADAC8BD868"
2023-06-09 11:28:17 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:2.70\\(abtq.3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "309BFD9B-C152-4E8D-8E4A-FBDC65F17184"
2023-06-09 11:28:17 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC74C679-6D22-47E4-AE8A-2647B1AA4276"
2023-06-09 11:28:17 +00:00
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-privilege-escalation-vulnerability-in-gs1900-series-switches" ,
"source" : "security@zyxel.com.tw" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-privilege-escalation-vulnerability-in-gs1900-series-switches" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-06-09 11:28:17 +00:00
}
]
2023-05-30 12:00:27 +00:00
}