7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
5.2%
Multiple improper input validation flaws were identified in some CLI commands of Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, VPN series firmware versions 4.30 through 5.21, NSG series firmware versions 1.00 through 1.33 Patch 4, NXC2500 firmware version 6.10(AAIG.3) and earlier versions, NAP203 firmware version 6.25(ABFA.7) and earlier versions, NWA50AX firmware version 6.25(ABYW.5) and earlier versions, WAC500 firmware version 6.30(ABVS.2) and earlier versions, and WAX510D firmware version 6.30(ABTF.2) and earlier versions, that could allow a local authenticated attacker to cause a buffer overflow or a system crash via a crafted payload.
CPE | Name | Operator | Version |
---|---|---|---|
zyxel:vpn100_firmware | zyxel vpn100 firmware | le | 5.21 |
[
{
"vendor": "Zyxel",
"product": "USG/ZyWALL series firmware",
"versions": [
{
"version": "4.09 through 4.71",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "USG FLEX series firmware",
"versions": [
{
"version": "4.50 through 5.21",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "ATP series firmware",
"versions": [
{
"version": "4.32 through 5.21",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "VPN series firmware",
"versions": [
{
"version": "4.30 through 5.21",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "NSG series firmware",
"versions": [
{
"version": "1.00 through 1.33 Patch 4",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "NXC2500 firmware",
"versions": [
{
"version": "<= 6.10(AAIG.3)",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "NAP203 firmware",
"versions": [
{
"version": "<= 6.25(ABFA.7)",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "NWA50AX firmware",
"versions": [
{
"version": "<= 6.25(ABYW.5)",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "WAC500 firmware",
"versions": [
{
"version": "<= 6.30(ABVS.2)",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "WAX510D firmware",
"versions": [
{
"version": "<= 6.30(ABTF.2)",
"status": "affected"
}
]
}
]
packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html
packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html
seclists.org/fulldisclosure/2022/Jun/15
www.zyxel.com/support/multiple-vulnerabilities-of-firewalls-AP-controllers-and-APs.shtml
More
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
5.2%