Lucene search

K
vulnrichmentZyxelVULNRICHMENT:CVE-2024-42060
HistorySep 03, 2024 - 1:54 a.m.

CVE-2024-42060

2024-09-0301:54:57
CWE-78
Zyxel
github.com
2
zyxel atp
usg flex
usg20(w)-vpn
command injection
authenticated attacker
os commands

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an authenticated attacker with administrator privileges to execute some OS commands on an affected device by uploading a crafted internal user agreement file to the vulnerable device.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "atp800_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "4.32",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50ax_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "usg_flex_700h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "4.5",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "usg_flex_50w_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "4.16",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-42060