This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A hardcoded, undocumented account (`zyfwp`) exists in Zyxel USG firmware. π **Consequences**: Attackers gain full **admin privileges** via SSH or Web UI.β¦
π‘οΈ **CWE**: Hardcoded Credentials / Backdoor. π **Flaw**: The password for the `zyfwp` account is stored in **plaintext** within the firmware.β¦
π¦ **Vendor**: Zyxel (China). π± **Products**: USG Series Firewalls & AP Controllers. π **Version**: Firmware **4.60** specifically. Check for strings like `v=200406233228` in `index.html` to confirm vulnerability.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: Full **Administrator** access. π **Access**: Can login via **SSH** or **Web Interface**. πΎ **Data**: Complete control over firewall rules, network traffic, and connected devices. No restrictions.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: **LOW**. π« **Auth**: No valid user credentials needed. Just the hardcoded `zyfwp` username and its plaintext password. π‘ **Config**: Remote exploitation is possible if SSH/Web ports are open.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp?**: **YES**. π **PoC**: Scanners available on GitHub (e.g., `ruppde/scan_CVE-2020-29583`, `nuclei-templates`). π **Wild Exploitation**: High risk.β¦
π **Self-Check**: Scan for the string `v=200406233228` in the device's `index.html`. π οΈ **Tools**: Use Nuclei templates or the specific GitHub scanner to detect the vulnerable firmware version remotely.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed?**: **YES**. π **Patch**: Zyxel released patches (e.g., Patch 1 for 4.60 on Dec 15). π **Ref**: Official Zyxel support page confirms the fix. Update firmware immediately.
Q9What if no patch? (Workaround)
π§ **No Patch?**: **Workaround**: Block external access to **SSH (22)** and **Web UI (443/80)** ports. π **Mitigation**: Restrict management interfaces to trusted internal IPs only. Disable unused services.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. β οΈ **Priority**: **P0**. Since credentials are hardcoded and public, any exposed Zyxel USG on firmware 4.60 is an open door. Patch immediately or isolate.