Lucene search

K
vulnrichmentZyxelVULNRICHMENT:CVE-2024-42058
HistorySep 03, 2024 - 1:47 a.m.

CVE-2024-42058

2024-09-0301:47:29
CWE-476
Zyxel
github.com
3
zyxel
atp series
usg flex
usg20(w)-vpn
null pointer dereference
vulnerability
dos
crafted packets

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

A null pointer dereference vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V5.20 through V5.38, and USG20(W)-VPN series firmware versions from V5.20 through V5.38 could allow an unauthenticated attacker to cause DoS conditions by sending crafted packets to a vulnerable device.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "atp800_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "4.32",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50ax_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "usg_flex_700h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "4.5",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "usg_flex_50w_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "5.20",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-42058