Action not permitted
Modal body text goes here.
wid-sec-w-2023-1765
Vulnerability from csaf_certbund
Published
2023-07-17 22:00
Modified
2023-07-17 22:00
Summary
Zyxel Firewall: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Zyxel ist ein Hersteller von Netzwerkkomponenten, u.a. von Firewalls.
Angriff
Ein Angreifer aus dem angrenzenden Netz kann mehrere Schwachstellen in Zyxel Firewall ausnutzen, um beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Zyxel ist ein Hersteller von Netzwerkkomponenten, u.a. von Firewalls.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer aus dem angrenzenden Netz kann mehrere Schwachstellen in Zyxel Firewall ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1765 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1765.json" }, { "category": "self", "summary": "WID-SEC-2023-1765 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1765" }, { "category": "external", "summary": "Zyxel Security Advisory vom 2023-07-17", "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "source_lang": "en-US", "title": "Zyxel Firewall: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-07-17T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:55:40.451+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1765", "initial_release_date": "2023-07-17T22:00:00.000+00:00", "revision_history": [ { "date": "2023-07-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Zyxel Firewall \u003c ZLD V5.37", "product": { "name": "Zyxel Firewall \u003c ZLD V5.37", "product_id": "T028657", "product_identification_helper": { "cpe": "cpe:/h:zyxel:firewall:zld_v5.37" } } } ], "category": "vendor", "name": "Zyxel" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-34141", "notes": [ { "category": "description", "text": "In Zyxel Firewall existieren mehrere Schwachstellen. Diese sind auf Fehler in Komponenten, einem Format-String-Fehler, einem Buffer-Overflow sowie Anf\u00e4lligkeiten f\u00fcr eine Commando-Injection zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand zu verursachen." } ], "release_date": "2023-07-17T22:00:00.000+00:00", "title": "CVE-2023-34141" }, { "cve": "CVE-2023-34140", "notes": [ { "category": "description", "text": "In Zyxel Firewall existieren mehrere Schwachstellen. Diese sind auf Fehler in Komponenten, einem Format-String-Fehler, einem Buffer-Overflow sowie Anf\u00e4lligkeiten f\u00fcr eine Commando-Injection zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand zu verursachen." } ], "release_date": "2023-07-17T22:00:00.000+00:00", "title": "CVE-2023-34140" }, { "cve": "CVE-2023-34139", "notes": [ { "category": "description", "text": "In Zyxel Firewall existieren mehrere Schwachstellen. Diese sind auf Fehler in Komponenten, einem Format-String-Fehler, einem Buffer-Overflow sowie Anf\u00e4lligkeiten f\u00fcr eine Commando-Injection zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand zu verursachen." } ], "release_date": "2023-07-17T22:00:00.000+00:00", "title": "CVE-2023-34139" }, { "cve": "CVE-2023-34138", "notes": [ { "category": "description", "text": "In Zyxel Firewall existieren mehrere Schwachstellen. Diese sind auf Fehler in Komponenten, einem Format-String-Fehler, einem Buffer-Overflow sowie Anf\u00e4lligkeiten f\u00fcr eine Commando-Injection zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand zu verursachen." } ], "release_date": "2023-07-17T22:00:00.000+00:00", "title": "CVE-2023-34138" }, { "cve": "CVE-2023-33012", "notes": [ { "category": "description", "text": "In Zyxel Firewall existieren mehrere Schwachstellen. Diese sind auf Fehler in Komponenten, einem Format-String-Fehler, einem Buffer-Overflow sowie Anf\u00e4lligkeiten f\u00fcr eine Commando-Injection zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand zu verursachen." } ], "release_date": "2023-07-17T22:00:00.000+00:00", "title": "CVE-2023-33012" }, { "cve": "CVE-2023-33011", "notes": [ { "category": "description", "text": "In Zyxel Firewall existieren mehrere Schwachstellen. Diese sind auf Fehler in Komponenten, einem Format-String-Fehler, einem Buffer-Overflow sowie Anf\u00e4lligkeiten f\u00fcr eine Commando-Injection zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand zu verursachen." } ], "release_date": "2023-07-17T22:00:00.000+00:00", "title": "CVE-2023-33011" }, { "cve": "CVE-2023-28767", "notes": [ { "category": "description", "text": "In Zyxel Firewall existieren mehrere Schwachstellen. Diese sind auf Fehler in Komponenten, einem Format-String-Fehler, einem Buffer-Overflow sowie Anf\u00e4lligkeiten f\u00fcr eine Commando-Injection zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand zu verursachen." } ], "release_date": "2023-07-17T22:00:00.000+00:00", "title": "CVE-2023-28767" } ] }
cve-2023-34139
Vulnerability from cvelistv5
Published
2023-07-17 17:36
Modified
2024-10-29 16:19
Severity ?
EPSS score ?
Summary
A command injection vulnerability in the Free Time WiFi hotspot feature of the Zyxel USG FLEX series firmware versions 4.50 through 5.36 Patch 2 and VPN series firmware versions 4.20 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Zyxel | USG FLEX series firmware |
Version: 4.50 through 5.36 Patch 2 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "usg_flex_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_Patch-2", "status": "affected", "version": "4.50", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:vpn_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "vpn_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_Patch-2", "status": "affected", "version": "4.20", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34139", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-29T16:18:52.786892Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-29T16:19:03.216Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.50 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.20 through 5.36 Patch 2" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A command injection vulnerability in the Free Time WiFi hotspot feature of the Zyxel USG FLEX series firmware versions 4.50 through 5.36 Patch 2 and VPN series firmware versions 4.20 through 5.36 Patch 2,\u0026nbsp;could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device." } ], "value": "A command injection vulnerability in the Free Time WiFi hotspot feature of the Zyxel USG FLEX series firmware versions 4.50 through 5.36 Patch 2 and VPN series firmware versions 4.20 through 5.36 Patch 2,\u00a0could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-18T01:16:42.677Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-34139", "datePublished": "2023-07-17T17:36:32.909Z", "dateReserved": "2023-05-26T03:44:51.339Z", "dateUpdated": "2024-10-29T16:19:03.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34141
Vulnerability from cvelistv5
Published
2023-07-17 17:56
Modified
2024-10-29 16:06
Severity ?
EPSS score ?
Summary
A command injection vulnerability in the access point (AP) management feature of the Zyxel ATP series firmware versions 5.00 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.00 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.00 through 5.36 Patch 2, VPN series firmware versions 5.00 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the managed AP list in advance.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | ATP series firmware |
Version: 5.00 through 5.36 Patch 2 |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:zyxel:atp:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "atp", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch-2", "status": "affected", "version": "5.00", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:zyxel:usg_flex:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "usg_flex", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch-2", "status": "affected", "version": "5.00", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_50w_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "usg_flex_50w_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch-2", "status": "affected", "version": "5.00", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "usg20w-vpn_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch-2", "status": "affected", "version": "5.00", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:vpn_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "vpn_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch-2", "status": "affected", "version": "5.00", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:nxc2500_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nxc2500_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "6.10(AAIG.3)", "status": "affected", "version": "6.10(AAIG.0)", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:nxc5500_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nxc5500_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "6.10(AAOS.4)", "status": "affected", "version": "6.10(AAOS.0)", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34141", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-29T15:54:42.546431Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-29T16:06:41.479Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ATP series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX 50(W) series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG20(W)-VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "NXC2500 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "6.10(AAIG.0) through 6.10(AAIG.3)" } ] }, { "defaultStatus": "unaffected", "product": "NXC5500 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": " 6.10(AAOS.0) through 6.10(AAOS.4)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A command injection vulnerability in the access point (AP) management feature of the Zyxel ATP series firmware versions 5.00 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.00 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.00 through 5.36 Patch 2, VPN series firmware versions 5.00 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the managed AP list in advance." } ], "value": "A command injection vulnerability in the access point (AP) management feature of the Zyxel ATP series firmware versions 5.00 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.00 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.00 through 5.36 Patch 2, VPN series firmware versions 5.00 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the managed AP list in advance." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-17T17:56:26.818Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-34141", "datePublished": "2023-07-17T17:56:26.818Z", "dateReserved": "2023-05-26T03:44:51.339Z", "dateUpdated": "2024-10-29T16:06:41.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34138
Vulnerability from cvelistv5
Published
2023-07-17 17:31
Modified
2024-10-30 18:02
Severity ?
EPSS score ?
Summary
A command injection vulnerability in the hotspot management feature of the Zyxel ATP series firmware versions 4.60 through 5.36 Patch 2, USG FLEX series firmware versions 4.60 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.60 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.60 through 5.36 Patch 2, and VPN series firmware versions 4.60 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the list of trusted RADIUS clients in advance.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | ATP series firmware |
Version: 4.60 through 5.36 Patch 2 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:zyxel:atp_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "atp_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36 Patch 2", "status": "affected", "version": "4.60", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "usg_flex_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36 Patch 2", "status": "affected", "version": "4.60", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_50w_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "usg_flex_50w_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36 Patch 2", "status": "affected", "version": "4.60", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "usg20w-vpn_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36 Patch 2", "status": "affected", "version": "4.60", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:vpn_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "vpn_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36 Patch 2", "status": "affected", "version": "4.60", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34138", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-30T17:59:03.869372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-30T18:02:28.372Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ATP series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.60 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.60 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX 50(W) series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.60 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG20(W)-VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.60 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.60 through 5.36 Patch 2" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A command injection vulnerability in the hotspot management feature of the Zyxel ATP series firmware versions 4.60 through 5.36 Patch 2, USG FLEX series firmware versions 4.60 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.60 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.60 through 5.36 Patch 2, and VPN series firmware versions 4.60 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the list of trusted RADIUS clients in advance." } ], "value": "A command injection vulnerability in the hotspot management feature of the Zyxel ATP series firmware versions 4.60 through 5.36 Patch 2, USG FLEX series firmware versions 4.60 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.60 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.60 through 5.36 Patch 2, and VPN series firmware versions 4.60 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the list of trusted RADIUS clients in advance." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-17T18:01:33.075Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-34138", "datePublished": "2023-07-17T17:31:40.719Z", "dateReserved": "2023-05-26T03:44:51.338Z", "dateUpdated": "2024-10-30T18:02:28.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34140
Vulnerability from cvelistv5
Published
2023-07-17 17:49
Modified
2024-10-21 19:42
Severity ?
EPSS score ?
Summary
A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.36 Patch 2, USG FLEX series firmware versions 4.50 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.16 through 5.36 Patch 2, VPN series firmware versions 4.30 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to cause denial of service (DoS) conditions by sending a crafted request to the CAPWAP daemon.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | ATP series firmware |
Version: 4.32 through 5.36 Patch 2 |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34140", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T19:17:36.859068Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T19:42:15.688Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ATP series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.32 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.50 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX 50(W) series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.16 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG20(W)-VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.16 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.30 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "NXC2500 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "6.10(AAIG.0) through 6.10(AAIG.3)" } ] }, { "defaultStatus": "unaffected", "product": "NXC5500 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "6.10(AAOS.0) through 6.10(AAOS.4)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.36 Patch 2, USG FLEX series firmware versions 4.50 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.16 through 5.36 Patch 2, VPN series firmware versions 4.30 through 5.36 Patch 2,\u0026nbsp;NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to cause denial of service (DoS) conditions by sending a crafted request to the CAPWAP daemon." } ], "value": "A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.36 Patch 2, USG FLEX series firmware versions 4.50 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.16 through 5.36 Patch 2, VPN series firmware versions 4.30 through 5.36 Patch 2,\u00a0NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to cause denial of service (DoS) conditions by sending a crafted request to the CAPWAP daemon." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-17T17:49:38.175Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-34140", "datePublished": "2023-07-17T17:49:38.175Z", "dateReserved": "2023-05-26T03:44:51.339Z", "dateUpdated": "2024-10-21T19:42:15.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28767
Vulnerability from cvelistv5
Published
2023-07-17 16:59
Modified
2024-11-07 19:14
Severity ?
EPSS score ?
Summary
The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36, USG FLEX 50(W) series firmware versions 5.10 through 5.36,
USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | ATP series firmware |
Version: 5.10 through 5.36 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:zyxel:atp_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "atp_series_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36", "status": "affected", "version": "5.10", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "usg_flex_series_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36", "status": "affected", "version": "5.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_50\\/w\\/_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "usg_flex_50\\/w\\/_series_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36", "status": "affected", "version": "5.10", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "usg_flex_series_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36", "status": "affected", "version": "5.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:atp_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "atp_series_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36", "status": "affected", "version": "5.10", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-28767", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T19:08:51.946121Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T19:14:46.971Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ATP series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX 50(W) series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36" } ] }, { "defaultStatus": "unaffected", "product": "USG20(W)-VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36" } ] }, { "defaultStatus": "unaffected", "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions\u0026nbsp;5.00 through 5.36,\u0026nbsp; USG FLEX 50(W) series firmware versions 5.10 through 5.36, \n\nUSG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled." } ], "value": "The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions\u00a05.00 through 5.36,\u00a0 USG FLEX 50(W) series firmware versions 5.10 through 5.36, \n\nUSG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-17T16:59:45.258Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-28767", "datePublished": "2023-07-17T16:59:45.258Z", "dateReserved": "2023-03-23T10:34:20.987Z", "dateUpdated": "2024-11-07T19:14:46.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33012
Vulnerability from cvelistv5
Published
2023-07-17 17:23
Modified
2024-08-02 15:32
Severity ?
EPSS score ?
Summary
A command injection vulnerability in the configuration parser of the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted GRE configuration when the cloud management mode is enabled.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | ATP series firmware |
Version: 5.10 through 5.36 Patch 2 |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-33012", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-07-31T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-10T03:55:13.069Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T15:32:46.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ATP series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX 50(W) series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG20(W)-VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A command injection vulnerability in the configuration parser of the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2,\u0026nbsp;could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted GRE configuration when the cloud management mode is enabled." } ], "value": "A command injection vulnerability in the configuration parser of the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2,\u00a0could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted GRE configuration when the cloud management mode is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-17T17:23:26.370Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-33012", "datePublished": "2023-07-17T17:23:26.370Z", "dateReserved": "2023-05-17T02:56:16.623Z", "dateUpdated": "2024-08-02T15:32:46.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33011
Vulnerability from cvelistv5
Published
2023-07-17 17:15
Modified
2024-11-07 19:08
Severity ?
EPSS score ?
Summary
A format string vulnerability in the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted PPPoE configuration on an affected device when the cloud management mode is enabled.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | ATP series firmware |
Version: 5.10 through 5.36 Patch 2 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:32:46.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:zyxel:vpn_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vpn_series_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch_2", "status": "affected", "version": "5.00", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "atp100_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch_2", "status": "affected", "version": "5.10", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "usg_flex_series_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch_2", "status": "affected", "version": "5.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg_flex_50\\/w\\/_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "usg_flex_50\\/w\\/_series_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch_2", "status": "affected", "version": "5.10", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "usg20w-vpn_firmware", "vendor": "zyxel", "versions": [ { "lessThanOrEqual": "5.36_patch_2", "status": "affected", "version": "5.10", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-33011", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T18:57:20.597639Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T19:08:01.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ATP series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG FLEX 50(W) series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "USG20(W)-VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.10 through 5.36 Patch 2" } ] }, { "defaultStatus": "unaffected", "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "5.00 through 5.36 Patch 2" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A format string vulnerability in the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted PPPoE configuration on an affected device when the cloud management mode is enabled." } ], "value": "A format string vulnerability in the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted PPPoE configuration on an affected device when the cloud management mode is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-17T17:15:45.876Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-33011", "datePublished": "2023-07-17T17:15:45.876Z", "dateReserved": "2023-05-17T02:56:16.623Z", "dateUpdated": "2024-11-07T19:08:01.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.