CVE-2008-1160
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
25/03/2008
Last modified:
09/04/2025
Description
ZyXEL ZyWALL 1050 has a hard-coded password for the Quagga and Zebra processes that is not changed when it is set by a user, which allows remote attackers to gain privileges.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:zyxel:zywall_1050_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:zyxel:zywall_1050:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf
- http://secunia.com/advisories/29237
- http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-%28default-pass%29-remote-root-vulnerability-2008032143791/
- http://www.securityfocus.com/bid/28184
- http://www.vupen.com/english/advisories/2008/0990/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41424
- https://www.exploit-db.com/exploits/5289
- http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf
- http://secunia.com/advisories/29237
- http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-%28default-pass%29-remote-root-vulnerability-2008032143791/
- http://www.securityfocus.com/bid/28184
- http://www.vupen.com/english/advisories/2008/0990/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41424
- https://www.exploit-db.com/exploits/5289