Vulnerability Details : CVE-2021-35029
An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device.
Vulnerability category: BypassGain privilege
Products affected by CVE-2021-35029
- cpe:2.3:o:zyxel:usg50_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_110_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_1100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_310_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg40_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg40w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg60_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg60w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg110_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg210_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg310_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg1100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg1900_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg2200-vpn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_vpn100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_vpn300_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg300_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg1000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg20_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg20w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_atp100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_atp100w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_atp200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_atp500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_atp700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_atp800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_vpn50_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-35029
0.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-35029
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
Zyxel Corporation |
CWE ids for CVE-2021-35029
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by:
- nvd@nist.gov (Primary)
- security@zyxel.com.tw (Secondary)
References for CVE-2021-35029
-
https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml
404 Error | ZyxelVendor Advisory
Jump to