CVE-2020-13365
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
06/08/2020
Last modified:
09/02/2022
Description
Certain Zyxel products have a locally accessible binary that allows a non-root user to generate a password for an undocumented user account that can be used for a TELNET session as root. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:* | v5.21\(aazf.9\)c0 (excluding) | |
| cpe:2.3:h:zyxel:nas326:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:nas520_firmware:*:*:*:*:*:*:*:* | v5.21\(aasz.5\)c0 (excluding) | |
| cpe:2.3:h:zyxel:nas520:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:nas540_firmware:*:*:*:*:*:*:*:* | v5.21\(aatb.6\)c0 (excluding) | |
| cpe:2.3:h:zyxel:nas540:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:nas542_firmware:*:*:*:*:*:*:*:* | v5.21\(abag.6\)c0 (excluding) | |
| cpe:2.3:h:zyxel:nas542:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



