First published: Wed Mar 26 2008(Updated: )
ZyXEL Prestige routers have a minimum password length for the admin account that is too small, which makes it easier for remote attackers to guess passwords via brute force methods.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZyXEL Prestige 660 | =h-d1 | |
ZyXEL Prestige 660 | =h-d3 | |
ZyXEL Prestige 661 | =hw-d1 | |
ZyXEL ZyNOS firmware | =3.40-agd.2 | |
ZyXEL ZyNOS firmware | =3.40-agl.3 | |
ZyXEL ZyNOS firmware | =3.40-ahq.0 | |
ZyXEL ZyNOS firmware | =3.40-ahq.3 | |
ZyXEL ZyNOS firmware | =3.40-ahz.0 | |
ZyXEL ZyNOS firmware | =3.40-atm.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1529 is considered a medium severity vulnerability due to the potential for remote attackers to exploit weak passwords.
To fix CVE-2008-1529, increase the minimum password length for the admin account on affected ZyXEL routers.
Devices such as Zyxel Prestige 660 and 661 as well as various Zyxel Zynos versions are affected by CVE-2008-1529.
Yes, CVE-2008-1529 can be exploited remotely, making it easier for attackers to perform brute force attacks on weak passwords.
The cause of CVE-2008-1529 is a minimum password length that is too small for the admin account on ZyXEL Prestige routers.