V2.70(AAHH.3) and the GS1900-8HP firmware version V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as 'root' on a vulnerable device via SSH.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-48707 | The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version V2.70(AAHH.3) and the GS1900-8HP firmware version V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as 'root' on a vulnerable device via SSH. |
Fri, 10 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-276 | |
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2025-01-10T17:32:54.505Z
Reserved: 2022-11-23T08:05:40.138Z
Link: CVE-2022-45853
Updated: 2024-08-03T14:24:03.156Z
Status : Modified
Published: 2023-05-30T11:15:09.237
Modified: 2025-01-10T18:15:14.623
Link: CVE-2022-45853
No data.
OpenCVE Enrichment
No data.
EUVD