![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.103161 |
Categoría: | Web application abuses |
Título: | Multiple ZyWALL USG Products Remote Security Bypass Vulnerability - Active Check |
Resumen: | Multiple ZyWALL USG products are prone to a security bypass; vulnerability.;; Note: Reportedly, the firmware is also prone to a weakness that allows password-protected upgrade; files to be decrypted with a known plaintext attack. |
Descripción: | Summary: Multiple ZyWALL USG products are prone to a security bypass vulnerability. Note: Reportedly, the firmware is also prone to a weakness that allows password-protected upgrade files to be decrypted with a known plaintext attack. Vulnerability Impact: Successful exploits may allow attackers to bypass certain security restrictions and perform unauthorized actions. Affected Software/OS: The following models are known to be affected: - ZyWALL USG-20 - ZyWALL USG-20W - ZyWALL USG-50 - ZyWALL USG-100 - ZyWALL USG-200 - ZyWALL USG-300 - ZyWALL USG-1000 - ZyWALL USG-1050 - ZyWALL USG-2000 Solution: Reportedly, the issue is fixed. However, Symantec has not confirmed this. Please contact the vendor for more information. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2011 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |