cve-2021-35036
Vulnerability from cvelistv5
Published
2022-03-01 06:20
Modified
2024-08-04 00:33
Summary
A cleartext storage of information vulnerability in the Zyxel VMG3625-T50B firmware version V5.50(ABTL.0)b2k could allow an authenticated attacker to obtain sensitive information from the configuration file.
Impacted products
Vendor Product Version
Zyxel VMG3625-T50B firmware Version: V5.50(ABTL.0)b2k
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:33:49.906Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "VMG3625-T50B firmware",
               vendor: "Zyxel",
               versions: [
                  {
                     status: "affected",
                     version: "V5.50(ABTL.0)b2k",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A cleartext storage of information vulnerability in the Zyxel VMG3625-T50B firmware version V5.50(ABTL.0)b2k could allow an authenticated attacker to obtain sensitive information from the configuration file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-312",
                     description: "CWE-312: Cleartext Storage of Sensitive Information",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-09-27T13:19:55",
            orgId: "96e50032-ad0d-4058-a115-4d2c13821f9f",
            shortName: "Zyxel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@zyxel.com.tw",
               ID: "CVE-2021-35036",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "VMG3625-T50B firmware",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V5.50(ABTL.0)b2k",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Zyxel",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A cleartext storage of information vulnerability in the Zyxel VMG3625-T50B firmware version V5.50(ABTL.0)b2k could allow an authenticated attacker to obtain sensitive information from the configuration file.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "6.5",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-312: Cleartext Storage of Sensitive Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability",
                     refsource: "CONFIRM",
                     url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "96e50032-ad0d-4058-a115-4d2c13821f9f",
      assignerShortName: "Zyxel",
      cveId: "CVE-2021-35036",
      datePublished: "2022-03-01T06:20:12",
      dateReserved: "2021-06-17T00:00:00",
      dateUpdated: "2024-08-04T00:33:49.906Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2021-35036\",\"sourceIdentifier\":\"security@zyxel.com.tw\",\"published\":\"2022-03-01T07:15:06.917\",\"lastModified\":\"2024-11-21T06:11:43.343\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A cleartext storage of information vulnerability in the Zyxel VMG3625-T50B firmware version V5.50(ABTL.0)b2k could allow an authenticated attacker to obtain sensitive information from the configuration file.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de almacenamiento de información en texto claro en la versión V5.50(ABTL.0)b2k del firmware de Zyxel VMG3625-T50B podría permitir a un atacante autenticado obtener información sensible del archivo de configuración\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:N/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:ax7501-b0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.17\\\\(abpc.2\\\\)c0\",\"matchCriteriaId\":\"86A231B7-26ED-4BCC-99CC-ECC327B54B03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78473083-F702-4B81-AAA0-B66A0984FF6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:dx3301-t0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abvy.3\\\\)c0\",\"matchCriteriaId\":\"788C6B76-4993-4ABD-83D1-DA6B0821026F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:dx3301-t0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BBDC072-5D40-4130-9B5F-22FDA9BF909A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:dx5401-b0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.17\\\\(abyo.2\\\\)c0\",\"matchCriteriaId\":\"96C7FD75-7675-4EDD-BF3B-0298D092A11B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:dx5401-b0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B293E564-2C48-442A-A415-34383DF3ADBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:emg3525-t50b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abpm.7\\\\)c0\",\"matchCriteriaId\":\"96BDAAFD-9622-4A88-A7D1-F0312F466F1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9259E2F6-885D-4B44-8D40-20758DA599D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:emg5523-t50b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abpm.7\\\\)c0\",\"matchCriteriaId\":\"144523AD-2BDE-408A-8FA2-EF3D5161158E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3ECE0EB-C429-4716-ABFB-73540847EB9E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:emg5723-t50k_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abom.8\\\\)c0\",\"matchCriteriaId\":\"C08C685F-93D8-4C5D-AE9B-5A1E30985075\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18982B2-E575-478E-A2B4-0932DE329056\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:ep240p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.40\\\\(abvh.0\\\\)c0a03\",\"matchCriteriaId\":\"462A698C-23E5-4766-BD8A-31271DFDCA6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:ep240p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91367DDE-F430-42F7-B4F2-28AEF7FDCB12\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:ex5401-b0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.17\\\\(abyo.2\\\\)c0\",\"matchCriteriaId\":\"D064FE76-DE01-42DA-824B-3FE6D3A52A6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:ex5401-b0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1B9D0C-AB6C-43E1-BFCA-50EF231510FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:ex5501-b0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.17\\\\(abry.3\\\\)c0\",\"matchCriteriaId\":\"48BB8CE5-ED23-43C8-AAFE-E619C0A5266B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:ex5501-b0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B8CDD0-E73A-4FAA-9964-D8C09949CB32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte3301-plus_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abqu.6\\\\)c0\",\"matchCriteriaId\":\"6716746F-4642-4BA8-B1FB-38CBE0FEFE65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte3301-plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4814D3A1-C0D4-4573-AD77-C2EE7AC11CB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte5388-m804_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abra.6\\\\)c0\",\"matchCriteriaId\":\"9EE41084-CC13-485C-A24E-E1994D5A0267\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte5388-m804:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E67FFCF7-ECE9-4644-B248-1B6E10AD9398\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte5388-s905_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abvi.6\\\\)c0\",\"matchCriteriaId\":\"95529AB7-F11A-4C46-9F06-B2E8E4C78054\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte5388-s905:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9F91C02-6CEB-44E3-A56F-96B49191E04A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte5398-m904_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abqv.2\\\\)c0\",\"matchCriteriaId\":\"A257907C-446C-4A90-B313-947F38E06105\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte5398-m904:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F90453B8-19FF-4FF3-A167-E1A70E022201\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte7240-m403_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.00\\\\(abmg.6\\\\)c0\",\"matchCriteriaId\":\"CF40EC3D-F6EB-49CB-9E7C-BA7B6F65656B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte7240-m403:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAE2212F-D523-4706-9FD2-FDA760EE4B4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte7461-m602_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.00\\\\(abqn.6\\\\)c0\",\"matchCriteriaId\":\"B67AC137-5B28-41B9-8F81-3DD703D7B962\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte7461-m602:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A307AD3-4E60-4859-B182-4CD4CB843757\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte7480-m804_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abra.6\\\\)c0\",\"matchCriteriaId\":\"7DFDC741-78E6-42AA-B647-DEE9F04AA2DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte7480-m804:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3480021-1538-48ED-BE89-BB0DF562C7DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte7480-s905_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.00\\\\(abqt.6\\\\)c0\",\"matchCriteriaId\":\"B911A91C-5252-4CAF-B915-E314833DDFCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte7480-s905:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E7AF237-04F2-4054-96DE-3FD059CF4B35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte7485-s905_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abvn.6\\\\)c0\",\"matchCriteriaId\":\"C3FAF3DA-0C8A-4E60-B7C6-4E36D77E9D43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte7485-s905:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09953F0-2415-45F7-811C-E9D1A361284C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:lte7490-m804_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"v1.00\\\\(abqy.5\\\\)c0\",\"matchCriteriaId\":\"094A13AB-92FC-482D-BB1A-DA28B088F29C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:lte7490-m804:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3380C6EB-4D52-4EB1-802C-778DDBDC7D12\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:nr5101_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abvc.6\\\\)c0\",\"matchCriteriaId\":\"9EB8687A-EADF-4B15-8F41-78F1070E0CA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:nr5101:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11197D03-1C93-4D6A-950C-273E46CBBC62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:nr7101_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abuv.7\\\\)c0\",\"matchCriteriaId\":\"63A72A80-DA68-4353-8FEA-D372180F8401\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D27B24-9822-432C-8B8B-9546EE32DEC6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:nr7102_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.00\\\\(abyd.2\\\\)c0\",\"matchCriteriaId\":\"C56958A5-2427-4A9A-BD40-3B548437CA36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:nr7102:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A15757-DE6F-4A72-9CAD-BAC04BD340A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:pm7300-t0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.42\\\\(acbc.1\\\\)c0\",\"matchCriteriaId\":\"D4E0639D-0861-4A10-AFA6-8251AD2217BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:pm7300-t0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD1E2E3-2BB8-4CB3-AF81-C916312FE361\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:pmg5317-t20b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.40\\\\(abki.4\\\\)c0\",\"matchCriteriaId\":\"20FA4B81-5FE7-43D5-8A96-A1BF0CBA8CC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:pmg5317-t20b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F1334B5-FC76-412F-A7EF-02EEEE677460\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:pmg5617-t20b2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.41\\\\(acbb.1\\\\)c0\",\"matchCriteriaId\":\"7FFBE0FC-A355-4E32-A606-4130B2581CE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:pmg5617-t20b2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B35005D7-D8E4-4BC5-A59C-6A69255E7EC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:pmg5617ga_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.40\\\\(abna.2\\\\)c0\",\"matchCriteriaId\":\"E53F230A-806F-413B-BE4B-2A95645751DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:pmg5617ga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C1B0834-3398-41B0-9A14-7D97768732B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:pmg5622ga_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.40\\\\(abnb.2\\\\)c0\",\"matchCriteriaId\":\"09514F76-89EC-4ADF-9400-F14BB917EF97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:pmg5622ga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"840AF834-B7A6-4ACA-BAB9-996D87476D3D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vmg3625-t50b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abtl.0\\\\)b2r\",\"matchCriteriaId\":\"6A689984-D14E-44AD-B86B-D165E3AF945E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vmg3625-t50b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB5E8468-D12F-4CBE-AC7E-27D5A928A85A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vmg3927-t50k_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abom.8\\\\)c0\",\"matchCriteriaId\":\"4A40BCD8-C6D5-4DD7-92A6-305886662570\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B33AE56-3948-494B-9E23-54D939DF0D3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vmg8623-t50b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abpm.7\\\\)c0\",\"matchCriteriaId\":\"32CAA0D0-8385-4333-9D94-A08F81C61FAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3535B63-318C-4EB5-ADC8-0AF3FB443DFC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vmg8825-t50k_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abom.8\\\\)c0\",\"matchCriteriaId\":\"0F7F95B3-A92F-492F-AE07-ABC54A3158AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C2320B-52DF-4F86-86D2-42FB62337773\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vmg3625-t50b_firmware:*:*:*:*:central_america:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(accr.0\\\\)b4\",\"matchCriteriaId\":\"997AEAFA-6689-40C4-AC5E-97E2935272A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vmg3625-t50b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB5E8468-D12F-4CBE-AC7E-27D5A928A85A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vmg3625-t50b_firmware:*:*:*:*:emea:*:*:*\",\"versionEndExcluding\":\"5.50\\\\(abpm.7\\\\)c0\",\"matchCriteriaId\":\"DBA31900-874A-495B-858E-18C8E1CEA3BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vmg3625-t50b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB5E8468-D12F-4CBE-AC7E-27D5A928A85A\"}]}]}],\"references\":[{\"url\":\"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability\",\"source\":\"security@zyxel.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.