mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
131 lines
4.4 KiB
JSON
131 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2008-1522",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-03-26T10:44:00.000",
|
|
"lastModified": "2018-10-11T20:35:16.427",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), have (1) \"user\" as their default password for the \"user\" account and (2) \"1234\" as their default password for the \"admin\" account, which makes it easier for remote attackers to obtain access."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los routers ZyXEL Prestige, incluyendo los modelos P-660 y P-661con firmware 3.40(AGD.2) hasta la 3.40(AHQ.3), tienen (1) \u201cuser\u201d como contrase\u00f1a por defecto para la cuenta \u201cuser\u201d y (2) \u201c1234\u201d como contrase\u00f1a por defecto para la cuenta \u201cadmin\u201d, la cual facilita el acceso a los atacantes remotos."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-16"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9B37DD5-40E7-43E3-8183-A755C488E383"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2850459-830C-49FD-89F8-0693E6D33543"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C2C98B6-E370-4E2C-988D-CC3F3AA78126"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC9ED360-9257-477C-8F21-0CD4C1D38F42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B170D9D8-4A01-4A97-947C-F978B07045C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D759579-E9E7-4344-BA88-CACECFB9C731"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35DB7E44-E00E-41E3-A701-FB5DAC8E48E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2344FB7D-785D-4C52-BF27-1EEAAB2726B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEA7FE7B-31E2-4164-882B-2E9712F95044"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.gnucitizen.org/projects/router-hacking-challenge/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41508",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |