Vulnerability Details : CVE-2019-17354
wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page.
Exploit prediction scoring system (EPSS) score for CVE-2019-17354
Probability of exploitation activity in the next 30 days: 0.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 45 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-17354
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
9.4
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H |
3.9
|
5.5
|
NIST |
CWE ids for CVE-2019-17354
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-17354
-
https://www.zyxel.com/us/en/
Zyxel, Your Networking AllyProduct
-
https://github.com/d0x0/Zyxel-NBG-418N-v2/blob/master/CVE-2019-17354
Zyxel-NBG-418N-v2/CVE-2019-17354 at master · d0x0/Zyxel-NBG-418N-v2 · GitHubThird Party Advisory
Products affected by CVE-2019-17354
- cpe:2.3:o:zyxel:nbg-418n_v2_firmware:1.00\(aarp.9\)c0:*:*:*:*:*:*:*