Lucene search

K
cveZyxelCVE-2024-42058
HistorySep 03, 2024 - 2:15 a.m.

CVE-2024-42058

2024-09-0302:15:04
CWE-476
Zyxel
web.nvd.nist.gov
27
zyxel atp
usg flex
usg20(w)-vpn
null pointer dereference
unauthenticated attacker
dos attack
crafted packets

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

17.7%

A null pointer dereference vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V5.20 through V5.38, and USG20(W)-VPN series firmware versions from V5.20 through V5.38 could allow an unauthenticated attacker to cause DoS conditions by sending crafted packets to a vulnerable device.

Affected configurations

Nvd
Node
zyxelzld_firmwareRange4.325.39
AND
zyxelatp100Match-
OR
zyxelatp100wMatch-
OR
zyxelatp200Match-
OR
zyxelatp500Match-
OR
zyxelatp700Match-
OR
zyxelatp800Match-
Node
zyxelzld_firmwareRange4.505.39
AND
zyxelusg_flex_100Match-
OR
zyxelusg_flex_100axMatch-
OR
zyxelusg_flex_100wMatch-
OR
zyxelusg_flex_200Match-
OR
zyxelusg_flex_50Match-
OR
zyxelusg_flex_500Match-
OR
zyxelusg_flex_700Match-
Node
zyxelzld_firmwareRange4.205.39
AND
zyxelusg_flex_50wMatch-
Node
zyxelzld_firmwareRange4.205.39
AND
zyxelusg_20w-vpnMatch-
VendorProductVersionCPE
zyxelzld_firmware*cpe:2.3:o:zyxel:zld_firmware:*:*:*:*:*:*:*:*
zyxelatp100-cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*
zyxelatp100w-cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*
zyxelatp200-cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*
zyxelatp500-cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*
zyxelatp700-cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*
zyxelatp800-cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*
zyxelusg_flex_100-cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*
zyxelusg_flex_100ax-cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:*
zyxelusg_flex_100w-cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 161

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ATP series firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "versions V4.32 through V5.38"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "USG FLEX series firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "versions V4.50 through V5.38"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "USG FLEX 50(W) series firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "versions V5.20 through V5.38"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "USG20(W)-VPN series firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "versions V5.20 through V5.38"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

17.7%

Related for CVE-2024-42058