Lucene search

K
saintSAINT CorporationSAINT:7FCBD59EAFA0E7C6CA4048B38D373B8C
HistoryJan 17, 2023 - 12:00 a.m.

Zyxel zhttpd and libclinkc.so buffer overflows

2023-01-1700:00:00
SAINT Corporation
my.saintcorporation.com
185
zyxel
firewall
buffer overflow
vulnerability
remote attacker
arbitrary code
update
security advisory

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.267 Low

EPSS

Percentile

96.8%

Added: 01/17/2023
CVE: CVE-2022-4510

Background

Zyxel Firewalls are a business solution providing protection from malware and unauthorized access.

Problem

A buffer overflow vulnerability in Zyxel firewalls could allow a remote, unauthenticated attacker to execute arbitrary code by requesting a specially crafted URI containing a long query string.

Resolution

Install the latest updates as described in the Zyxel advisory.

References

<https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-multiple-zyxel-devices/&gt;

Platforms

Zyxel

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.267 Low

EPSS

Percentile

96.8%