CVE-2020-24355

CVSS V2 High 10 CVSS V3 Critical 9.8
Description
Zyxel VMG5313-B30B router on firmware 5.13(ABCJ.6)b3_1127, and possibly older versions of firmware are affected by insecure permissions which allows regular and other users to create new users with elevated privileges. This is done by changing "FirstIndex" field in JSON that is POST-ed during account creation. Similar may also be possible with account deletion.
Overview
  • CVE ID
  • CVE-2020-24355
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-09-02T12:15:10
  • Last Modified Date
  • 2020-09-11T16:17:01
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:zyxel:vmg5313-b30b_firmware:*:*:*:*:*:*:*:* 1 OR 5.13\(abcj.6\)b3_1127
cpe:2.3:h:zyxel:vmg5313-b30b:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.zyxel.com/support/security_advisories.shtml Vendor Advisory
https://blog.somegeneric.ninja/Zyxel_VMG5153_B30B_part2 Exploit Third Party Advisory
https://blog.somegeneric.ninja/Zyxel_VMG5153_B30B Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:24:35 Added to TrackCVE
2022-12-04 21:55:06 2020-09-02T12:15Z 2020-09-02T12:15:10 CVE Published Date updated
2022-12-04 21:55:06 2020-09-11T16:17:01 CVE Modified Date updated
2022-12-04 21:55:06 Analyzed Vulnerability Status updated