CVE-2024-12398

Jan. 21, 2025, 9:12 p.m.

8.8
High

Description

An improper privilege management vulnerability in the web management interface of the Zyxel WBE530 firmware versions through 7.00(ACLE.3) and WBE660S firmware versions through 6.70(ACGG.2) could allow an authenticated user with limited privileges to escalate their privileges to that of an administrator, enabling them to upload configuration files to a vulnerable device.

Product(s) Impacted

Vendor Product Versions
Zyxel
  • Nwa50ax Firmware
  • Nwa50ax
  • Nwa50ax Pro Firmware
  • Nwa50ax Pro
  • Nwa55axe Firmware
  • Nwa55axe
  • Nwa90ax Firmware
  • Nwa90ax
  • Nwa90ax Pro Firmware
  • Nwa90ax Pro
  • Nwa110ax Firmware
  • Nwa110ax
  • Nwa130be Firmware
  • Nwa130be
  • Nwa210ax Firmware
  • Nwa210ax
  • Nwa220ax-6e Firmware
  • Nwa220ax-6e
  • Nwa1123acv3 Firmware
  • Nwa1123acv3
  • Wac500 Firmware
  • Wac500
  • Wac500h Firmware
  • Wac500h
  • Wax300h Firmware
  • Wax300h
  • Wax510d Firmware
  • Wax510d
  • Wax610d Firmware
  • Wax610d
  • Wax620d-6e Firmware
  • Wax620d-6e
  • Wax630s Firmware
  • Wax630s
  • Wax640s-6e Firmware
  • Wax640s-6e
  • Wax650s Firmware
  • Wax650s
  • Wax655e Firmware
  • Wax655e
  • Wbe530 Firmware
  • Wbe530
  • Wbe660s Firmware
  • Wbe660s
  • Usg Lite 60ax Firmware
  • Usg Lite 60ax
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-269
Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o zyxel nwa50ax_firmware / / / / / / / /
h zyxel nwa50ax - / / / / / / /
o zyxel nwa50ax_pro_firmware / / / / / / / /
h zyxel nwa50ax_pro - / / / / / / /
o zyxel nwa55axe_firmware / / / / / / / /
h zyxel nwa55axe - / / / / / / /
o zyxel nwa90ax_firmware / / / / / / / /
h zyxel nwa90ax - / / / / / / /
o zyxel nwa90ax_pro_firmware / / / / / / / /
h zyxel nwa90ax_pro - / / / / / / /
o zyxel nwa110ax_firmware / / / / / / / /
h zyxel nwa110ax - / / / / / / /
o zyxel nwa130be_firmware / / / / / / / /
h zyxel nwa130be - / / / / / / /
o zyxel nwa210ax_firmware / / / / / / / /
h zyxel nwa210ax - / / / / / / /
o zyxel nwa220ax-6e_firmware / / / / / / / /
h zyxel nwa220ax-6e - / / / / / / /
o zyxel nwa1123acv3_firmware / / / / / / / /
h zyxel nwa1123acv3 - / / / / / / /
o zyxel wac500_firmware / / / / / / / /
h zyxel wac500 - / / / / / / /
o zyxel wac500h_firmware / / / / / / / /
h zyxel wac500h - / / / / / / /
o zyxel wax300h_firmware / / / / / / / /
h zyxel wax300h - / / / / / / /
o zyxel wax510d_firmware / / / / / / / /
h zyxel wax510d - / / / / / / /
o zyxel wax610d_firmware / / / / / / / /
h zyxel wax610d - / / / / / / /
o zyxel wax620d-6e_firmware / / / / / / / /
h zyxel wax620d-6e - / / / / / / /
o zyxel wax630s_firmware / / / / / / / /
h zyxel wax630s - / / / / / / /
o zyxel wax640s-6e_firmware / / / / / / / /
h zyxel wax640s-6e - / / / / / / /
o zyxel wax650s_firmware / / / / / / / /
h zyxel wax650s - / / / / / / /
o zyxel wax655e_firmware / / / / / / / /
h zyxel wax655e - / / / / / / /
o zyxel wbe530_firmware / / / / / / / /
h zyxel wbe530 - / / / / / / /
o zyxel wbe660s_firmware / / / / / / / /
h zyxel wbe660s - / / / / / / /
o zyxel usg_lite_60ax_firmware / / / / / / / /
h zyxel usg_lite_60ax - / / / / / / /

CVSS Score

8.8 / 10

CVSS Data

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Date

  • Published: Jan. 14, 2025, 2:15 a.m.
  • Last Modified: Jan. 21, 2025, 9:12 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security@zyxel.com.tw

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.