ID

VAR-200708-0018


CVE

CVE-2007-4316


TITLE

Zyxel Zywall 2 Run on ZyNOS Vulnerability to execute management actions in the management interface

Trust: 0.8

sources: JVNDB: JVNDB-2007-005957

DESCRIPTION

The management interface in ZyNOS firmware 3.62(WK.6) on the Zyxel Zywall 2 device has a certain default password, which allows remote attackers to perform administrative actions. Zywall 2 is prone to a remote security vulnerability. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: ZyXEL ZyWALL / ZyNOS Cross-Site Request Forgery SECUNIA ADVISORY ID: SA26381 VERIFY ADVISORY: http://secunia.com/advisories/26381/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: ZyXEL ZyWALL Series http://secunia.com/product/147/ ZyXEL ZyNOS 3.x http://secunia.com/product/149/ DESCRIPTION: Henri Lindberg has reported a vulnerability in ZyXEL ZyWALL / ZyNOS, which can be exploited by malicious people to conduct cross-site request forgery attacks. This can be exploited to perform certain actions when a logged in administrator is tricked into visiting a malicious website. NOTE: Reportedly, this can further be exploited to conduct script insertion attacks. The vulnerabilities are reported in Zyxell ZyWALL 2 and in ZyNOS firmware version V3.62(WK.6). Other versions may also be affected. SOLUTION: Do not browser untrusted sites while being logged in to the administrative section of the device. PROVIDED AND/OR DISCOVERED BY: Henri Lindberg of Louhi Networks. ORIGINAL ADVISORY: http://www.louhi.fi/advisory/zyxel_070810.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2007-4316 // JVNDB: JVNDB-2007-005957 // BID: 85486 // PACKETSTORM: 58606

AFFECTED PRODUCTS

vendor:zyxelmodel:zynosscope:eqversion:3.62

Trust: 1.9

vendor:zyxelmodel:zywall 2scope: - version: -

Trust: 1.4

vendor:zyxelmodel:zywall 2scope:eqversion:*

Trust: 1.0

vendor:zyxelmodel:zynosscope:eqversion:3.62(wk.6)

Trust: 0.8

vendor:zyxelmodel:zywallscope:eqversion:20

Trust: 0.3

sources: BID: 85486 // JVNDB: JVNDB-2007-005957 // CNNVD: CNNVD-200708-177 // NVD: CVE-2007-4316

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4316
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-4316
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200708-177
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2007-4316
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2007-005957 // CNNVD: CNNVD-200708-177 // NVD: CVE-2007-4316

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-4316

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200708-177

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200708-177

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-005957

PATCH

title:Top Pageurl:http://www.zyxel.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-005957

EXTERNAL IDS

db:NVDid:CVE-2007-4316

Trust: 2.7

db:SREASONid:3002

Trust: 1.9

db:SECUNIAid:26381

Trust: 1.7

db:OSVDBid:37669

Trust: 1.6

db:XFid:35914

Trust: 0.9

db:JVNDBid:JVNDB-2007-005957

Trust: 0.8

db:BUGTRAQid:20070810 ZYXEL ZYWALL 2 MULTIPLE VULNERABILITIES

Trust: 0.6

db:CNNVDid:CNNVD-200708-177

Trust: 0.6

db:BIDid:85486

Trust: 0.3

db:PACKETSTORMid:58606

Trust: 0.1

sources: BID: 85486 // JVNDB: JVNDB-2007-005957 // PACKETSTORM: 58606 // CNNVD: CNNVD-200708-177 // NVD: CVE-2007-4316

REFERENCES

url:http://www.louhi.fi/advisory/zyxel_070810.txt

Trust: 2.0

url:http://securityreason.com/securityalert/3002

Trust: 1.9

url:http://osvdb.org/37669

Trust: 1.6

url:http://secunia.com/advisories/26381

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35914

Trust: 1.0

url:http://www.securityfocus.com/archive/1/476031/100/0/threaded

Trust: 1.0

url:http://xforce.iss.net/xforce/xfdb/35914

Trust: 0.9

url:http://www.securityfocus.com/archive/1/archive/1/476031/100/0/threaded

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4316

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4316

Trust: 0.8

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/149/

Trust: 0.1

url:http://secunia.com/product/147/

Trust: 0.1

url:http://secunia.com/advisories/26381/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: BID: 85486 // JVNDB: JVNDB-2007-005957 // PACKETSTORM: 58606 // CNNVD: CNNVD-200708-177 // NVD: CVE-2007-4316

CREDITS

Unknown

Trust: 0.3

sources: BID: 85486

SOURCES

db:BIDid:85486
db:JVNDBid:JVNDB-2007-005957
db:PACKETSTORMid:58606
db:CNNVDid:CNNVD-200708-177
db:NVDid:CVE-2007-4316

LAST UPDATE DATE

2025-04-10T23:13:15.192000+00:00


SOURCES UPDATE DATE

db:BIDid:85486date:2007-08-13T00:00:00
db:JVNDBid:JVNDB-2007-005957date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200708-177date:2007-08-14T00:00:00
db:NVDid:CVE-2007-4316date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:85486date:2007-08-13T00:00:00
db:JVNDBid:JVNDB-2007-005957date:2012-12-20T00:00:00
db:PACKETSTORMid:58606date:2007-08-15T19:37:35
db:CNNVDid:CNNVD-200708-177date:2007-08-13T00:00:00
db:NVDid:CVE-2007-4316date:2007-08-13T21:17:00