FTP: Zyxel Configuration File Request

This signature detects attempts to exploit a known vulnerability in Zyxel Prestige 600 Series DSL CPE device. Using a default password, attackers can access and download device configuration files using FTP.

Extended Description

In the default factory configuration settings, Prestige routers have the administrative Telnet and FTP services available on the WAN interface. ZyXEL also uses a single common default administrator password. On a Prestige router with the default password still set, any user can connect remotely and make configuration changes, firmware upgrades, and password changes.

Affected Products

Zyxel prestige_642r

Short Name
FTP:EXPLOIT:ZYXEL-CONF-GET
Severity
Major
Recommended
False
Recommended Action
Drop
Category
FTP
Keywords
CVE-1999-0571 Configuration File Request Zyxel bid:3161
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Zyxel

CVSS Score

10.0

Found a potential security threat?