CVE-2020-13365

CVSS V2 High 9 CVSS V3 High 8.8
Description
Certain Zyxel products have a locally accessible binary that allows a non-root user to generate a password for an undocumented user account that can be used for a TELNET session as root. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.
Overview
  • CVE ID
  • CVE-2020-13365
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-08-06T17:15:10
  • Last Modified Date
  • 2022-02-09T16:51:42
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:* 1 OR v5.21\(aazf.9\)c0
cpe:2.3:h:zyxel:nas326:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:zyxel:nas520_firmware:*:*:*:*:*:*:*:* 1 OR v5.21\(aasz.5\)c0
cpe:2.3:h:zyxel:nas520:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:zyxel:nas540_firmware:*:*:*:*:*:*:*:* 1 OR v5.21\(aatb.6\)c0
cpe:2.3:h:zyxel:nas540:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:zyxel:nas542_firmware:*:*:*:*:*:*:*:* 1 OR v5.21\(abag.6\)c0
cpe:2.3:h:zyxel:nas542:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9
  • Severity
  • HIGH
  • Exploitability Score
  • 8
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-05-10 06:33:29 Added to TrackCVE
2022-12-04 20:38:04 2020-08-06T17:15Z 2020-08-06T17:15:10 CVE Published Date updated
2022-12-04 20:38:04 2022-02-09T16:51:42 CVE Modified Date updated
2022-12-04 20:38:04 Analyzed Vulnerability Status updated