First published: Tue Sep 10 2024(Updated: )
An insufficient entropy vulnerability caused by the improper use of a randomness function with low entropy for web authentication tokens generation exists in the Zyxel GS1900-10HP firmware version V2.80(AAZI.0)C0. This vulnerability could allow a LAN-based attacker a slight chance to gain a valid session token if multiple authenticated sessions are alive.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel GS1900-48HPv2 | <2.80\(abtq.1\)c0 | |
Zyxel GS1900-48HPv2 Firmware | ||
All of | ||
Zyxel GS1900-48 Firmware | <2.80\(aahn.1\)c0 | |
Zyxel GS1900-48HP Firmware | ||
All of | ||
Zyxel GS1900-24HPv2 | <2.80\(abtp.1\)c0 | |
Zyxel GS1900-48HPv2 | ||
All of | ||
Zyxel GS1900-24EP Firmware | <2.80\(abto.1\)c0 | |
Zyxel GS1900-24EP Firmware | ||
All of | ||
Zyxel GS1900-24E Firmware | <=2.80\(aahk.1\)c0 | |
Zyxel GS1900-24E Firmware | ||
All of | ||
ZyXEL GS1900-24 firmware | <=2.80\(aahl.1\)c0 | |
Zyxel GS1900-24E Firmware | ||
All of | ||
Zyxel GS1900-16 | <2.80\(aahj.1\)c0 | |
Zyxel GS1900-16 Firmware | ||
All of | ||
Zyxel GS1900-10HP firmware | <2.80\(aazi.1\)c0 | |
Zyxel GS1900-10HP firmware | ||
All of | ||
Zyxel GS1900-8HP firmware | <2.80\(aahi.1\)c0 | |
Zyxel GS1900-8HP firmware | ||
All of | ||
Zyxel GS1900-8 firmware | <2.80\(aahh.1\)c0 | |
Zyxel GS1900-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38270 is considered a vulnerability with a slight risk of exploitation due to insufficient entropy in web authentication token generation.
To mitigate CVE-2024-38270, update the firmware of the affected Zyxel GS1900 series switches to the latest version provided by Zyxel.
CVE-2024-38270 affects several Zyxel GS1900 series switches, including models GS1900-10HP, GS1900-24E, and GS1900-48HPV2 with specific firmware versions.
CVE-2024-38270 can allow a LAN-based attacker to potentially gain unauthorized access to web authentication tokens.
The responsibility for fixing CVE-2024-38270 lies with Zyxel, which will provide patches through firmware updates as necessary.