Vulnerability Details : CVE-2008-1160
Public exploit exists!
ZyXEL ZyWALL 1050 has a hard-coded password for the Quagga and Zebra processes that is not changed when it is set by a user, which allows remote attackers to gain privileges.
Products affected by CVE-2008-1160
- cpe:2.3:o:zyxel:zywall_1050_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1160
18.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1160
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-02-13 |
CWE ids for CVE-2008-1160
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1160
-
http://www.securityfocus.com/bid/28184
Broken Link;Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/29237
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
https://www.exploit-db.com/exploits/5289
ZYXEL ZyWALL Quagga/Zebra - 'Default Password' Remote Code Execution - Hardware remote ExploitThird Party Advisory;VDB Entry
-
http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf
404 Not FoundBroken Link
-
http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-(default-pass)-remote-root-vulnerability-2008032143791/
-
http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-%28default-pass%29-remote-root-vulnerability-2008032143791/
Broken Link
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41424
ZyWALL Quagga and Zebra default password CVE-2008-1160 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2008/0990/references
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link;Vendor Advisory
Jump to