Lucene search

K
saintSAINT CorporationSAINT:29970D3CCCF91BB5940AEB374899EB89
HistoryJan 17, 2023 - 12:00 a.m.

Zyxel zhttpd and libclinkc.so buffer overflows

2023-01-1700:00:00
SAINT Corporation
download.saintcorporation.com
138
zyxel firewall
buffer overflow
remote attack
arbitrary code execution
security advisory
vulnerabilities

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.267 Low

EPSS

Percentile

96.8%

Added: 01/17/2023
CVE: CVE-2022-4510

Background

Zyxel Firewalls are a business solution providing protection from malware and unauthorized access.

Problem

A buffer overflow vulnerability in Zyxel firewalls could allow a remote, unauthenticated attacker to execute arbitrary code by requesting a specially crafted URI containing a long query string.

Resolution

Install the latest updates as described in the Zyxel advisory.

References

<https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-multiple-zyxel-devices/&gt;

Platforms

Zyxel

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.267 Low

EPSS

Percentile

96.8%