CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
22.5%
The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versionsΒ 5.00 through 5.36,Β USG FLEX 50(W) series firmware versions 5.10 through 5.36,
USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
Vendor | Product | Version | CPE |
---|---|---|---|
zyxel | usg_2200-vpn | - | cpe:2.3:h:zyxel:usg_2200-vpn:-:*:*:*:*:*:*:* |
zyxel | usg_2200-vpn_firmware | * | cpe:2.3:o:zyxel:usg_2200-vpn_firmware:*:*:*:*:*:*:*:* |
zyxel | usg_flex_100 | - | cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* |
zyxel | usg_flex_100_firmware | * | cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:* |
zyxel | usg_flex_100w | - | cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* |
zyxel | usg_flex_100w_firmware | * | cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* |
zyxel | usg_flex_200 | - | cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* |
zyxel | usg_flex_200_firmware | * | cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* |
zyxel | usg_flex_50 | - | cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* |
zyxel | usg_flex_50_firmware | * | cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* |