First published: Wed Sep 27 2017(Updated: )
ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel NWA1100-N | ||
Zyxel NWA1100-N Firmware | ||
ZyXEL NWA1100-NH | ||
ZyXEL NWA1100-NH firmware | ||
ZyXEL NWA1121-NI firmware | ||
ZyXEL NWA1121-NI firmware | ||
ZyXEL NWA1123-AC | ||
ZyXEL NWA1123-AC firmware | ||
ZyXEL NWA1123-NI firmware | ||
ZyXEL NWA1123-NI firmware | ||
ZyXEL P-663HN-51 firmware | ||
ZyXEL P-660HN-51 firmware | ||
ZyXEL P-663HN-51 firmware | ||
ZyXEL P-663HN-51 firmware | ||
ZyXEL VMG1312-B10A | ||
ZyXEL VMG1312-B10A firmware | ||
ZyXEL VMG1312-B30A | ||
ZyXEL VMG1312-B30A firmware | ||
ZyXEL VMG1312-B30B firmware | ||
ZyXEL VMG1312-B30B firmware | ||
ZyXEL VMG4380-B10A | ||
ZyXEL VMG4380-B10A firmware | ||
ZyXEL VMG8324-B10A firmware | ||
zyxel vmg8324-b10a | ||
ZyXEL VMG8924-B10A | ||
ZyXEL VMG8924-B10A firmware | ||
ZyXEL VMG8924-B30A | ||
ZyXEL VMG8924-B30A firmware | ||
ZyXEL VSG1435-B101 | ||
ZyXEL VSG1435-B101 firmware | ||
ZyXEL PMG5318-B20A | ||
ZyXEL PMG5318-B20A firmware | ||
ZyXEL SBG3300-N000 | ||
ZyXEL SBG3300-N000 firmware | ||
ZyXEL SBG3300-NB00 | ||
ZyXEL SBG3300-NB00 firmware | ||
ZyXEL SBG3500-N000 | ||
ZyXEL SBG3500-N000 firmware | ||
Zyxel GS1900-8 firmware | ||
Zyxel GS1900-8 | ||
ZyXEL GS1900-24 firmware | ||
Zyxel GS1900-24 | ||
ZyXEL C1000Z | ||
ZyXEL C1000Z firmware | ||
ZyXEL Q1000 firmware | ||
ZyXEL Q1000 firmware | ||
ZyXEL FR1000Z | ||
ZyXEL FR1000Z firmware | ||
ZyXEL P8702N firmware | ||
ZyXEL P8702N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7256 has been assigned a Medium severity rating due to its potential for unauthorized access.
To mitigate CVE-2015-7256, update your ZyXEL firmware to the latest version provided by the manufacturer.
CVE-2015-7256 affects various ZyXEL access points and DSL CPEs including models like NWA1100-N and VMG1312 series.
Yes, CVE-2015-7256 can be exploited remotely, making it critical to secure affected devices.
CVE-2015-7256 involves vulnerabilities related to insufficient protection of SSH private keys and certificates.