CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to cause denial-of-service (DoS) conditions by executing the CLI command to dump system logs on an affected device.
Vendor | Product | Version | CPE |
---|---|---|---|
zyxel | zld | * | cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* |
zyxel | atp100 | - | cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* |
zyxel | atp100w | - | cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* |
zyxel | atp200 | - | cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* |
zyxel | atp500 | - | cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* |
zyxel | atp700 | - | cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* |
zyxel | atp800 | - | cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* |
zyxel | usg_flex_100 | - | cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* |
zyxel | usg_flex_100w | - | cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* |
zyxel | usg_flex_200 | - | cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"product": "ATP series firmware",
"vendor": "Zyxel",
"versions": [
{
"status": "affected",
"version": "versions 4.32 through 5.37"
}
]
},
{
"defaultStatus": "unaffected",
"product": "USG FLEX series firmware",
"vendor": "Zyxel",
"versions": [
{
"status": "affected",
"version": "versions 4.50 through 5.37"
}
]
},
{
"defaultStatus": "unaffected",
"product": "USG FLEX 50(W) series firmware",
"vendor": "Zyxel",
"versions": [
{
"status": "affected",
"version": "versions 4.16 through 5.37"
}
]
},
{
"defaultStatus": "unaffected",
"product": "USG20(W)-VPN series firmware",
"vendor": "Zyxel",
"versions": [
{
"status": "affected",
"version": "versions 4.16 through 5.37"
}
]
},
{
"defaultStatus": "unaffected",
"product": "VPN series firmware",
"vendor": "Zyxel",
"versions": [
{
"status": "affected",
"version": "versions 4.30 through 5.37"
}
]
}
]