René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

131 lines
4.4 KiB
JSON

{
"id": "CVE-2008-1522",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-26T10:44:00.000",
"lastModified": "2018-10-11T20:35:16.427",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), have (1) \"user\" as their default password for the \"user\" account and (2) \"1234\" as their default password for the \"admin\" account, which makes it easier for remote attackers to obtain access."
},
{
"lang": "es",
"value": "Los routers ZyXEL Prestige, incluyendo los modelos P-660 y P-661con firmware 3.40(AGD.2) hasta la 3.40(AHQ.3), tienen (1) \u201cuser\u201d como contrase\u00f1a por defecto para la cuenta \u201cuser\u201d y (2) \u201c1234\u201d como contrase\u00f1a por defecto para la cuenta \u201cadmin\u201d, la cual facilita el acceso a los atacantes remotos."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-16"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B37DD5-40E7-43E3-8183-A755C488E383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2850459-830C-49FD-89F8-0693E6D33543"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2C98B6-E370-4E2C-988D-CC3F3AA78126"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*",
"matchCriteriaId": "AC9ED360-9257-477C-8F21-0CD4C1D38F42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*",
"matchCriteriaId": "B170D9D8-4A01-4A97-947C-F978B07045C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*",
"matchCriteriaId": "9D759579-E9E7-4344-BA88-CACECFB9C731"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*",
"matchCriteriaId": "35DB7E44-E00E-41E3-A701-FB5DAC8E48E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*",
"matchCriteriaId": "2344FB7D-785D-4C52-BF27-1EEAAB2726B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*",
"matchCriteriaId": "CEA7FE7B-31E2-4164-882B-2E9712F95044"
}
]
}
]
}
],
"references": [
{
"url": "http://www.gnucitizen.org/projects/router-hacking-challenge/",
"source": "cve@mitre.org"
},
{
"url": "http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41508",
"source": "cve@mitre.org"
}
]
}