CVE-2020-29583

Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server or web interface with admin privileges.
References
Link Resource
http://ftp.zyxel.com/USG40/firmware/USG40_4.60%28AALA.1%29C0_2.pdf Broken Link
https://businessforum.zyxel.com/discussion/5252/zld-v4-60-revoke-and-wk48-firmware-release Release Notes
https://businessforum.zyxel.com/discussion/5254/whats-new-for-zld4-60-patch-1-available-on-dec-15 Release Notes
https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html Broken Link Third Party Advisory
https://www.secpod.com/blog/a-secret-zyxel-firewall-and-ap-controllers-could-allow-for-administrative-access-cve-2020-29583/ Exploit Third Party Advisory
https://www.zyxel.com/support/CVE-2020-29583.shtml Vendor Advisory
https://www.zyxel.com/support/security_advisories.shtml Vendor Advisory
http://ftp.zyxel.com/USG40/firmware/USG40_4.60%28AALA.1%29C0_2.pdf Broken Link
https://businessforum.zyxel.com/discussion/5252/zld-v4-60-revoke-and-wk48-firmware-release Release Notes
https://businessforum.zyxel.com/discussion/5254/whats-new-for-zld4-60-patch-1-available-on-dec-15 Release Notes
https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html Broken Link Third Party Advisory
https://www.secpod.com/blog/a-secret-zyxel-firewall-and-ap-controllers-could-allow-for-administrative-access-cve-2020-29583/ Exploit Third Party Advisory
https://www.zyxel.com/support/CVE-2020-29583.shtml Vendor Advisory
https://www.zyxel.com/support/security_advisories.shtml Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-29583
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zyxel:usg20-vpn_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:zyxel:usg20w-vpn_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:zyxel:usg40_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:zyxel:usg40w_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:zyxel:usg60_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:zyxel:usg60w_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:zyxel:usg110_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:zyxel:usg210_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:zyxel:usg310_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:zyxel:usg1100_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg1100:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:zyxel:usg1900_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg1900:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:zyxel:usg2200_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg2200:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:zyxel:zywall110_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:zywall110:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:zyxel:zywall310_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:zywall310:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:zyxel:zywall1100_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:zywall1100:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:zyxel:atp100_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:zyxel:atp100w_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:zyxel:atp200_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:zyxel:atp500_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:zyxel:atp700_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:zyxel:atp800_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:zyxel:vpn50_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:zyxel:vpn100_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:zyxel:vpn300_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:zyxel:vpn1000_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_100_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_100w_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_200_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_500_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_700_firmware:4.60:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*

History

22 Oct 2025, 00:17

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-29583 -

21 Oct 2025, 20:18

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-29583', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:18

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-29583 -

Information

Published : 2020-12-22 22:15

Updated : 2025-10-22 00:17


NVD link : CVE-2020-29583

Mitre link : CVE-2020-29583

CVE.ORG link : CVE-2020-29583


JSON object : View

Products Affected

zyxel

  • usg60w_firmware
  • usg40w_firmware
  • zywall310_firmware
  • atp500
  • atp800
  • usg_flex_100_firmware
  • usg310
  • atp200_firmware
  • usg_flex_200_firmware
  • usg_flex_100w
  • usg40w
  • usg40
  • usg110_firmware
  • usg1900
  • atp100w_firmware
  • atp800_firmware
  • vpn50
  • atp500_firmware
  • vpn50_firmware
  • usg2200_firmware
  • zywall1100_firmware
  • usg40_firmware
  • atp100w
  • vpn100_firmware
  • usg2200
  • usg1100
  • usg1900_firmware
  • usg310_firmware
  • usg_flex_100w_firmware
  • usg20w-vpn_firmware
  • usg110
  • usg210_firmware
  • zywall1100
  • usg1100_firmware
  • usg210
  • atp100_firmware
  • zywall310
  • usg20-vpn
  • usg_flex_500
  • usg_flex_100
  • vpn300
  • zywall110
  • atp700
  • vpn1000_firmware
  • atp700_firmware
  • atp200
  • usg20w-vpn
  • usg60_firmware
  • usg20-vpn_firmware
  • usg_flex_500_firmware
  • usg60
  • atp100
  • vpn100
  • usg_flex_700
  • usg_flex_200
  • vpn300_firmware
  • usg60w
  • usg_flex_700_firmware
  • vpn1000
  • zywall110_firmware
CWE
CWE-522

Insufficiently Protected Credentials