CVE-2020-29583
Severity CVSS v4.0:
Pending analysis
Type:
CWE-522
Insufficiently Protected Credentials
Publication date:
22/12/2020
Last modified:
07/11/2025
Description
Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server or web interface with admin privileges.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zyxel:usg20-vpn_firmware:4.60:*:*:*:*:*:*:* | ||
| cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:usg20w-vpn_firmware:4.60:*:*:*:*:*:*:* | ||
| cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:usg40_firmware:4.60:*:*:*:*:*:*:* | ||
| cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:usg40w_firmware:4.60:*:*:*:*:*:*:* | ||
| cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:usg60_firmware:4.60:*:*:*:*:*:*:* | ||
| cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:usg60w_firmware:4.60:*:*:*:*:*:*:* | ||
| cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:usg110_firmware:4.60:*:*:*:*:*:*:* | ||
| cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:usg210_firmware:4.60:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ftp.zyxel.com/USG40/firmware/USG40_4.60%28AALA.1%29C0_2.pdf
- https://businessforum.zyxel.com/discussion/5252/zld-v4-60-revoke-and-wk48-firmware-release
- https://businessforum.zyxel.com/discussion/5254/whats-new-for-zld4-60-patch-1-available-on-dec-15
- https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html
- https://www.secpod.com/blog/a-secret-zyxel-firewall-and-ap-controllers-could-allow-for-administrative-access-cve-2020-29583/
- https://www.zyxel.com/support/CVE-2020-29583.shtml
- https://www.zyxel.com/support/security_advisories.shtml
- http://ftp.zyxel.com/USG40/firmware/USG40_4.60%28AALA.1%29C0_2.pdf
- https://businessforum.zyxel.com/discussion/5252/zld-v4-60-revoke-and-wk48-firmware-release
- https://businessforum.zyxel.com/discussion/5254/whats-new-for-zld4-60-patch-1-available-on-dec-15
- https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html
- https://www.secpod.com/blog/a-secret-zyxel-firewall-and-ap-controllers-could-allow-for-administrative-access-cve-2020-29583/
- https://www.zyxel.com/support/CVE-2020-29583.shtml
- https://www.zyxel.com/support/security_advisories.shtml
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-29583



