First published: Tue Jan 17 2023(Updated: )
A pair of spare WiFi credentials is stored in the configuration file of the Zyxel AX7501-B0 firmware prior to V5.17(ABPC.3)C0 in cleartext. An unauthenticated attacker could use the credentials to access the WLAN service if the configuration file has been retrieved from the device by leveraging another known vulnerability.
Credit: security@zyxel.com.tw security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel AX7501-B0 firmware | <5.17\(abpc.3\)c0 | |
Zyxel AX7501-B0 | ||
All of | ||
Zyxel AX7501-B0 firmware | <5.17\(abpc.3\)c0 | |
Zyxel AX7501-B0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45439 is a vulnerability in the Zyxel AX7501-B0 firmware that allows an unauthenticated attacker to access the WLAN service using spare WiFi credentials stored in clear text.
CVE-2022-45439 has a severity rating of 6.5, which is considered medium.
Versions prior to V5.17(ABPC.3)C0 of the Zyxel AX7501-B0 firmware are affected by CVE-2022-45439.
An attacker can leverage CVE-2022-45439 by retrieving the configuration file from the device and using the spare WiFi credentials stored in clear text.
No, the Zyxel AX7501-B0 firmware version V5.17(ABPC.3)C0 is not vulnerable to CVE-2022-45439.