Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Gs1900\-8hp_firmware
(Zyxel)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-09-10 | CVE-2024-38270 | An insufficient entropy vulnerability caused by the improper use of a randomness function with low entropy for web authentication tokens generation exists in the Zyxel GS1900-10HP firmware version V2.80(AAZI.0)C0. This vulnerability could allow a LAN-based attacker a slight chance to gain a valid session token if multiple authenticated sessions are alive. | Gs1900\-10hp_firmware, Gs1900\-16_firmware, Gs1900\-24_firmware, Gs1900\-24e_firmware, Gs1900\-24ep_firmware, Gs1900\-24hpv2_firmware, Gs1900\-48_firmware, Gs1900\-48hpv2_firmware, Gs1900\-8_firmware, Gs1900\-8hp_firmware | 6.5 | ||
2023-11-07 | CVE-2023-35140 | The improper privilege management vulnerability in the Zyxel GS1900-24EP switch firmware version V2.70(ABTO.5) could allow an authenticated local user with read-only access to modify system settings on a vulnerable device. | Gs1900\-10hp_firmware, Gs1900\-16_firmware, Gs1900\-24_firmware, Gs1900\-24e_firmware, Gs1900\-24ep_firmware, Gs1900\-24hpv2_firmware, Gs1900\-48_firmware, Gs1900\-48hpv2_firmware, Gs1900\-8_firmware, Gs1900\-8hp_firmware | N/A | ||
2023-05-30 | CVE-2022-45853 | The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version V2.70(AAHH.3) and the GS1900-8HP firmware version V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as 'root' on a vulnerable device via SSH. | Gs1900\-10hp_firmware, Gs1900\-16_firmware, Gs1900\-24_firmware, Gs1900\-24e_firmware, Gs1900\-24ep_firmware, Gs1900\-24hpv2_firmware, Gs1900\-48_firmware, Gs1900\-48hpv2_firmware, Gs1900\-8_firmware, Gs1900\-8hp_firmware | 6.7 |