7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.6 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
51.9%
A buffer overflow vulnerability in the “sdwan_iface_ipc” binary of Zyxel ATP series firmware versions 5.10 through 5.32, USG FLEX series firmware versions 5.00 through 5.32, USG FLEX 50(W) firmware versions 5.10 through 5.32, USG20(W)-VPN firmware versions 5.10 through 5.32, and VPN series firmware versions 5.00 through 5.35, which could allow a remote unauthenticated attacker to cause a core dump with a request error message on a vulnerable device by uploading a crafted configuration file.
CPE | Name | Operator | Version |
---|---|---|---|
zyxel:usg_flex_100_firmware | zyxel usg flex 100 firmware | le | 5.32 |
[
{
"vendor": "Zyxel",
"product": "ATP series firmware",
"versions": [
{
"version": "5.10 through 5.32",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "USG FLEX series firmware",
"versions": [
{
"version": "5.00 through 5.32",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "USG FLEX 50(W) firmware",
"versions": [
{
"version": "5.10 through 5.32",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "USG20(W)-VPN firmware",
"versions": [
{
"version": "5.10 through 5.32",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "VPN series firmware",
"versions": [
{
"version": "5.00 through 5.35",
"status": "affected"
}
]
}
]
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.6 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
51.9%