cve-2023-33010
Vulnerability from cvelistv5
Published
2023-05-24 00:00
Modified
2024-08-02 15:32
Severity ?
EPSS score ?
Summary
A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | ATP series firmware |
Version: 4.32 through 5.36 Patch 1 |
||||||||||||||||||||
|
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2023-06-05
Due date: 2023-06-26
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-33010
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:32:46.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ATP series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.32 through 5.36 Patch 1" } ] }, { "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.50 through 5.36 Patch 1" } ] }, { "product": "USG FLEX 50(W) firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.25 through 5.36 Patch 1" } ] }, { "product": "USG20(W)-VPN firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.25 through 5.36 Patch 1" } ] }, { "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.30 through 5.36 Patch 1" } ] }, { "product": "ZyWALL/USG series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.25 through 4.73 Patch 1" } ] } ], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-24T00:00:00", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls" } ] } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-33010", "datePublished": "2023-05-24T00:00:00", "dateReserved": "2023-05-17T00:00:00", "dateUpdated": "2024-08-02T15:32:46.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "cisa_known_exploited": { "cveID": "CVE-2023-33010", "cwes": "[\"CWE-120\"]", "dateAdded": "2023-06-05", "dueDate": "2023-06-26", "knownRansomwareCampaignUse": "Unknown", "notes": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-33010", "product": "Multiple Firewalls", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the ID processing function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.", "vendorProject": "Zyxel", "vulnerabilityName": "Zyxel Multiple Firewalls Buffer Overflow Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2023-33010\",\"sourceIdentifier\":\"security@zyxel.com.tw\",\"published\":\"2023-05-24T13:15:09.640\",\"lastModified\":\"2024-11-21T08:04:23.920\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"cisaExploitAdd\":\"2023-06-05\",\"cisaActionDue\":\"2023-06-26\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Zyxel Multiple Firewalls Buffer Overflow Vulnerability\",\"weaknesses\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"73E39B94-291E-4E3A-8A89-B74FF063BA05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp100_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5813B69-C1A3-4695-8B63-17994BBA1723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp100_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B61DE8A9-6A73-45EF-8C37-39138F39168A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7654A1-3806-41C7-82D4-46B0CD7EE53B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"84A41F09-4474-4ABC-B2FA-92B17F63A7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp200_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FF3D01-C9AA-452C-A079-3180DC8DB269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp200_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ABED29D-8074-46AB-8A0F-759B0653691B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D68A36FF-8CAF-401C-9F18-94F3A2405CF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"8B7E5F75-5577-4511-A1F4-1BD142D60BD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp500_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9801F3AB-4560-44AA-934F-0A6D31F46195\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp500_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0E5B17-00E0-4CB0-9787-D6A8C8E1E0BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2818E8AC-FFEE-4DF9-BF3F-C75166C0E851\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"B8F79940-F737-4A71-9FAC-1F99E0BCE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp100w_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBAF763-195F-4B36-A450-719931B86650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp100w_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB974EC-859A-4B74-8A60-98A5406E8F43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47398FD0-6C5E-4625-9EFD-DE08C9AB7DB2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"7728D2C4-0B0A-404E-92BC-AAA1A1987BFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp700_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CF847A-A858-43A6-B35B-91455682E382\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp700_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BE980D6-9D39-41B9-A35C-1879B72F4146\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B41F437-855B-4490-8011-DF59887BE6D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"791D6928-BE82-4678-A8A4-39C9D9A1C684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp800_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA1C872C-9192-410D-86F1-55CDF07DE77C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp800_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EECC0FB9-DED8-4ACF-A627-0537F3EE8C65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B99746-0589-46E6-9CBD-F38619AD97DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"FC95F84E-95A0-4FB8-942A-732E022E3CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9E3C5E-9447-40D2-9036-6097FF433433\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F0F5D8-AC3F-4485-A013-5109FB796FF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B30A4C0-9928-46AD-9210-C25656FB43FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF66A8A2-EE45-43ED-8F5A-FF488AC39943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F185DD94-DDA0-4B37-BADE-8468BA08CC02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"646C1F07-B553-47B0-953B-DC7DE7FD0F8B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"F65ACDFE-3A54-46D6-98CA-2D51957072AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E7810E-370E-4405-B7A2-C988511BE7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8571FFB9-A90D-4EBD-87C0-F5119D142CEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F93B6A06-2951-46D2-A7E1-103D7318D612\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"C0B8FF81-5020-429E-ABC7-D0F18A5177F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"46E17CE0-8EA7-4188-B3E7-DBD1D30C8DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3D2B551-E080-4F75-A0C7-30D9E684EEEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C697A5-D1D3-4FF0-9C43-D27B18181958\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"FD0F817C-6388-41E2-9F80-9B5427036865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A4E9538-EFB8-4181-A48B-D9B09F124B4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ECBAE12-DD16-476C-A2F1-2DF5F334741D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D1396E3-731B-4D05-A3F8-F3ABB80D5C29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"FC95F84E-95A0-4FB8-942A-732E022E3CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED353C3-7BD1-4270-8D70-0B3D51C276E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEA17444-10FA-4B93-A2D3-5D00151C12C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D74ABA7E-AA78-4A13-A64E-C44021591B42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.25\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"0751B297-FB9F-4F44-BF19-1C7668B8B757\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"206BCF6E-CEB7-4972-B321-ED3CAFD92E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18F99AF2-8419-4ADC-9F46-D53C177BA50F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"110A1CA4-0170-4834-8281-0A3E14FC5584\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"107BB5B9-9C04-4C35-88AD-4D59ECD17778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5776089E-F9F4-4A0E-A169-FA1FC4DC6329\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BEA412F-3DA1-4E91-9C74-0666147DABCE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"FB329984-D2A1-40B4-826D-78643B8DD4C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn100_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5FD9479-4FF2-412C-AB26-5F46FB354653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn100_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"499EA838-5310-4C1C-B9E7-2AB90ACEAA2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D90A7B-174F-40A1-8AF4-08B15B7BAC40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"B01FA34A-CA33-48E7-978C-638FC678C9C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn50_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C9CFAA-87BB-4FFE-9191-0A662E58A2F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn50_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"062596D1-4466-46B6-B6B6-4403675B6A3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E3AC823-0ECA-42D8-8312-2FBE5914E4C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"D0135FFF-62FA-4AEA-8B67-1CCA2D85D8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn300_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B41E614E-708B-4793-B10A-E264AC128AC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn300_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF398D47-F670-4669-B0BC-9BD9DEC553AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C45C303-1A95-4245-B242-3AB9B9106CD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"5DB62871-BC40-43D8-A486-471CD9316332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn1000_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA96F7C3-B9DA-4B14-8C69-05A8BC1C4FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn1000_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F62D2F9-2D33-4E3F-B641-C721CF34B5C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EECD311A-4E96-4576-AADF-47291EDE3559\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndExcluding\":\"5.36\",\"matchCriteriaId\":\"7079103C-ED92-40C3-AF42-4689822A96E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC69FAB1-C862-470A-8CBF-BB8751485611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD54572-2C29-4D2E-B15A-DE3A16D8E3CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7239C54F-EC9E-44B4-AE33-1D36E5448219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_40_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.25\",\"versionEndExcluding\":\"4.73\",\"matchCriteriaId\":\"24F44F62-BE75-45DE-9160-E807F6789BE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_40_firmware:4.73:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"97239F61-5715-476B-BD20-B40746AAFE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_40_firmware:4.73:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA798B77-D4B4-4F21-A543-A6C5AAD7878F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D84DDB81-DE66-4427-8833-633B45A45A14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_40w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.25\",\"versionEndExcluding\":\"4.73\",\"matchCriteriaId\":\"F1C7AA79-C28C-4075-B420-FE41D106D6C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_40w_firmware:4.73:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C2309AF-4FDB-4564-B2C4-B7BA67F1DA6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_40w_firmware:4.73:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A04A40D-7093-49E3-A7A7-8C6F148F460F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_40w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F11F36C-60DB-4D81-A320-53EEE43758C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_60w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.25\",\"versionEndExcluding\":\"4.73\",\"matchCriteriaId\":\"560B1BFF-DB43-426C-A3B9-BF9A595EA62F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_60w_firmware:4.73:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C76684E-0F6D-4D89-8E59-343988366E1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_60w_firmware:4.73:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14613F31-56A0-4F5B-9E1A-F316A4508F3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_60w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82864EF6-B63D-4947-A18C-AE0156CCA7FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_60_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.25\",\"versionEndExcluding\":\"4.73\",\"matchCriteriaId\":\"3208CBB7-A4A2-4D92-9A40-766328C0CE4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_60_firmware:4.73:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"02C8DD42-9023-43B9-8B8B-BF9CC79E27E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_60_firmware:4.73:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B7249A0-0AE1-4C01-BF04-BD8BA385C84D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C65DB5E9-2FE3-4807-970E-A42FDF82B50E\"}]}]}],\"references\":[{\"url\":\"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls\",\"source\":\"security@zyxel.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.