Description
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console.
Published: 2019-11-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-6723 An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console.
History

No history.

Subscriptions

Zyxel Gs1900-10hp Gs1900-10hp Firmware Gs1900-16 Gs1900-16 Firmware Gs1900-24 Gs1900-24 Firmware Gs1900-24e Gs1900-24e Firmware Gs1900-24hp Gs1900-24hp Firmware Gs1900-48 Gs1900-48 Firmware Gs1900-48hp Gs1900-48hp Firmware Gs1900-8 Gs1900-8 Firmware Gs1900-8hp Gs1900-8hp Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T00:56:22.466Z

Reserved: 2019-08-29T00:00:00.000Z

Link: CVE-2019-15804

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-14T21:15:11.953

Modified: 2024-11-21T04:29:30.103

Link: CVE-2019-15804

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses