CVE-2022-40602

Use of Hard-coded Credentials (CWE-798)

Published: Nov 22, 2022 / Updated: 24mo ago

010
CVSS 9.8EPSS 0.13%Critical
CVE info copied to clipboard

A flaw in the Zyxel LTE3301-M209 firmware verisons prior to V1.00(ABLG.6)C0 could allow a remote attacker to access the device using an improper pre-configured password if the remote administration feature has been enabled by an authenticated administrator.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2022-40602. See article

Nov 22, 2022 at 1:45 AM / twitter.com
EPSS

EPSS Score was set to: 0.13% (Percentile: 47.5%)

Sep 23, 2023 at 1:18 AM
Static CVE Timeline Graph

Affected Systems

Zyxel/lte3301-m209_firmware
+null more

Patches

www.zyxel.com
+null more

Links to Mitre Att&cks

T1552.001: Credentials In Files
+null more

Attack Patterns

CAPEC-191: Read Sensitive Constants Within an Executable
+null more

References

Zyxel security advisory for pre-configured password vulnerability of LTE3301-M209 | Zyxel Networks
Zyxel has released a patch for its LTE indoor router LTE3301-M209 to address a pre-configured password vulnerability. After a thorough investigation, we’ve found that the root cause existed in pre-configured code provided by our vendor and affected only one product still within its vulnerability support period.

News

ZyXEL routers showed signs of a backdoor credential
Based on reports, a researcher found the password hidden inside the ZyXEL LTE3301-M209 firmware routers. Based on reports, the compromised detail hiding inside the LTE indoor routers is a hard-coded backdoor credential tracked as CVE-2022-40602.
Zyxel security advisory for pre-configured password vulnerability of LTE3301-M209 | Zyxel Networks
Zyxel has released a patch for its LTE indoor router LTE3301-M209 to address a pre-configured password vulnerability. After a thorough investigation, we’ve found that the root cause existed in pre-configured code provided by our vendor and affected only one product still within its vulnerability support period.
Italian security researcher RE-Solver has found several backdoor credentials in the firmware of some ZyXEL routers. This includes hardcoded superuser credentials that can bypass web UI authentication and hardcoded credentials to allow root access via Telnet. https:// resolverblog.blogspot.com/2022 /12/cve-2022-40602-zyxel-lte3301-m209.html
Daily Vulnerability Trends: Wed Dec 28 2022
CVE-2021-44228 Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.
Backdoor Credential Found in ZyXEL Router
Cybersecurity researcher RE-Solver claimed to have found hardcoded credentials (CVE-2022-40602) in ZyXEL LTE3301-M209 LTE indoor routers. The bug he exploited is a Telnet backdoor in D-Link DWR-921 that is also present in the ZyXEL LTE3301-M209.
See 25 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI