A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to cause denial-of-service (DoS) conditions by executing the CLI command to dump system logs on an affected device.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 08:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps - Vendor Advisory |
04 Dec 2023, 18:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Zyxel usg 20w-vpn
Zyxel atp500 Zyxel zld Zyxel usg Flex 700 Zyxel atp200 Zyxel usg Flex 50 Zyxel atp100 Zyxel usg Flex 50w Zyxel vpn50w Zyxel usg Flex 100 Zyxel vpn50 Zyxel vpn1000 Zyxel atp800 Zyxel Zyxel usg Flex 100w Zyxel atp100w Zyxel vpn300 Zyxel usg Flex 200 Zyxel vpn100 Zyxel usg Flex 500 Zyxel atp700 |
|
CPE | cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* |
|
CWE | CWE-120 | |
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps - Vendor Advisory |
28 Nov 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-28 02:15
Updated : 2024-11-21 08:12
NVD link : CVE-2023-37926
Mitre link : CVE-2023-37926
CVE.ORG link : CVE-2023-37926
JSON object : View
Products Affected
zyxel
- usg_flex_700
- vpn50
- usg_flex_50
- zld
- atp100
- atp100w
- usg_flex_500
- vpn300
- usg_flex_100w
- usg_flex_200
- usg_20w-vpn
- vpn100
- usg_flex_100
- vpn1000
- usg_flex_50w
- atp800
- atp200
- vpn50w
- atp700
- atp500
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')