#VU95269 Use of hard-coded credentials in ZWX-2000CSW2-HN - CVE-2024-39838


Vulnerability identifier: #VU95269

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39838

CWE-ID: CWE-798

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
ZWX-2000CSW2-HN
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: ZEXELON

Description

The vulnerability allows a remote user to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A remote administrator on the local network can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

ZWX-2000CSW2-HN: before 0.3.15


External links
https://jvn.jp/en/jp/JVN70666401/index.html
https://www.zexelon.co.jp/pdf/jvn70666401.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability