Vulnerability Details : CVE-2022-30526
Public exploit exists!
A privilege escalation vulnerability was identified in the CLI command of Zyxel USG FLEX 100(W) firmware versions 4.50 through 5.30, USG FLEX 200 firmware versions 4.50 through 5.30, USG FLEX 500 firmware versions 4.50 through 5.30, USG FLEX 700 firmware versions 4.50 through 5.30, USG FLEX 50(W) firmware versions 4.16 through 5.30, USG20(W)-VPN firmware versions 4.16 through 5.30, ATP series firmware versions 4.32 through 5.30, VPN series firmware versions 4.30 through 5.30, USG/ZyWALL series firmware versions 4.09 through 4.72, which could allow a local attacker to execute some OS commands with root privileges in some directories on a vulnerable device.
Vulnerability category: Gain privilege
Products affected by CVE-2022-30526
- cpe:2.3:o:zyxel:zywall_110_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_1100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:zywall_310_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_2200-vpn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg40_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg40w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg60_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg60w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-30526
3.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2022-30526
-
Zyxel Firewall SUID Binary Privilege Escalation
Disclosure Date: 2022-06-14First seen: 2022-12-23exploit/linux/local/zyxel_suid_cp_lpeThis module exploits CVE-2022-30526, a local privilege escalation vulnerability that allows a low privileged user (e.g. nobody) escalate to root. The issue stems from a suid binary that allows all users to copy files as root. This module overwrites the firewa
CVSS scores for CVE-2022-30526
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
Zyxel Corporation |
CWE ids for CVE-2022-30526
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by:
- nvd@nist.gov (Primary)
- security@zyxel.com.tw (Secondary)
References for CVE-2022-30526
-
http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html
Zyxel Firewall SUID Binary Privilege Escalation ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.zyxel.com/support/Zyxel-security-advisory-authenticated-directory-traversal-vulnerabilities-of-firewalls.shtml
Zyxel security advisory for local privilege escalation and authenticated directory traversal vulnerabilities of firewalls | ZyxelVendor Advisory
Jump to