Lucene search

K
vulnrichmentZyxelVULNRICHMENT:CVE-2024-42059
HistorySep 03, 2024 - 1:51 a.m.

CVE-2024-42059

2024-09-0301:51:20
CWE-78
Zyxel
github.com
4
zyxel
usg series
command injection
authentication
ftp vulnerability

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V5.00 through V5.38, USG FLEX series firmware versions from V5.00 through V5.38, USG FLEX 50(W) series firmware versions from V5.00 through V5.38, and USG20(W)-VPN series firmware versions from V5.00 through V5.38 could allow an authenticated attacker with administrator privileges to execute some OS commands on an affected device by uploading a crafted compressed language file via FTP.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "usg_flex_50w_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "5.00",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "atp800_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "5.00",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50ax_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "usg_flex_700h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "5.00",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-42059