Lucene search

K
vulnrichmentZyxelVULNRICHMENT:CVE-2024-7203
HistorySep 03, 2024 - 1:36 a.m.

CVE-2024-7203

2024-09-0301:36:32
CWE-78
Zyxel
github.com
1
post-authentication
command injection
zyxel
atp
usg flex
firmware
os commands
authenticated attacker
administrator privileges

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.60 through V5.38 and USG FLEX series firmware versions from V4.60 through V5.38 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device by executing a crafted CLI command.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "atp800_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "4.60",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50ax_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*",
      "cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "usg_flex_700h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "4.60",
        "versionType": "custom",
        "lessThanOrEqual": "5.38"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-7203