Vulnerability CVE-2019-9955


Published: 2019-04-22

Description:
On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

Vendor: Zyxel
Product: Usg1900 firmware 
Version: 4.31;
Product: Atp200 firmware 
Version: 4.31;
Product: Usg40w firmware 
Version: 4.31;
Product: Usg20w-vpn firmware 
Version: 4.31;
Product: Atp800 firmware 
Version: 4.31;
Product: Zywall 110 firmware 
Version: 4.31;
Product: Usg60w firmware 
Version: 4.31;
Product: Usg2200-vpn firmware 
Version: 4.31;
Product: Usg110 firmware 
Version: 4.31;
Product: Usg40 firmware 
Version: 4.31;
Product: Usg20-vpn firmware 
Version: 4.31;
Product: Atp500 firmware 
Version: 4.31;
Product: Zywall 1100 firmware 
Version: 4.31;
Product: Usg60 firmware 
Version: 4.31;
Product: Usg210 firmware 
Version: 4.31;
Product: Usg1100 firmware 
Version: 4.31;
Product: Zywall 310 firmware 
Version: 4.31;
Product: Usg310 firmware 
Version: 4.31;
Product: Vpn50 firmware 
Product: Vpn300 firmware 
Product: Vpn100 firmware 

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

 References:
http://packetstormsecurity.com/files/152525/Zyxel-ZyWall-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2019/Apr/22
https://www.exploit-db.com/exploits/46706/
https://www.securitymetrics.com/blog/Zyxel-Devices-Vulnerable-Cross-Site-Scripting-Login-page
https://www.zyxel.com/support/reflected-cross-site-scripting-vulnerability-of-firewalls.shtml

Related CVE
CVE-2019-12583
Missing Access Control in the "Free Time" component of several Zyxel UAG, USG, and ZyWall devices allows a remote attacker to generate guest accounts by directly accessing the account generator. This can lead to unauthorised network access or Denial ...
CVE-2019-12581
A reflective Cross-site scripting (XSS) vulnerability in the free_time_failed.cgi CGI program in selected Zyxel ZyWall, USG, and UAG devices allows remote attackers to inject arbitrary web script or HTML via the err_msg parameter.
CVE-2019-6725
The rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user's password can be obtained by viewing the HTML source code, and the interface of the modem ca...
CVE-2017-18374
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has two user accounts with default passwords, including a hardcoded service account with the username true and password true. These accounts can be us...
CVE-2017-18372
The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp pag...
CVE-2017-18371
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username superv...
CVE-2017-18370
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.as...
CVE-2017-18368
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability ...

Copyright 2019, cxsecurity.com

 

Back to Top