Zyxel D1000 CWMP Get Default Password

critical Nessus Plugin ID 96448

Synopsis

Nessus was able to acquire the password from the Zyxel D1000 device.

Description

Nessus was able to acquire the password from the Zyxel D1000 device by using CWMP commands over the TR-064 protocol. This protocol is typically open on port 7547.

Solution

Upgrade to the latest version of the firmware.

See Also

http://www.nessus.org/u?87597061

Plugin Details

Severity: Critical

ID: 96448

File Name: zyxel_d1000_get_key.nasl

Version: 1.5

Type: remote

Family: Misc.

Published: 1/12/2017

Updated: 6/12/2020

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/h:eircom_limited:zyxel_d1000

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/7/2016