A null pointer dereference vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1 and USG FLEX series firmware versions from 4.50 through 5.37 Patch 1 could allow a LAN-based attacker to cause denial-of-service (DoS) conditions by downloading a crafted RAR compressed file onto a LAN-side host if the firewall has the “Anti-Malware” feature enabled.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
History
21 Jan 2025, 18:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Zyxel usg Flex 100
Zyxel atp500 Firmware Zyxel atp100 Firmware Zyxel atp100 Zyxel usg Flex 100ax Firmware Zyxel usg Flex 700h Firmware Zyxel usg Flex 100 Firmware Zyxel usg Flex 700 Firmware Zyxel usg Flex 200hp Zyxel usg Flex 100w Firmware Zyxel usg Flex 700h Zyxel usg Flex 100w Zyxel atp200 Zyxel usg Flex 100h Firmware Zyxel usg Flex 50w Zyxel usg Flex 200hp Firmware Zyxel usg Flex 700 Zyxel Zyxel usg Flex 200h Firmware Zyxel usg Flex 100h Zyxel atp800 Zyxel usg Flex 500 Zyxel usg Flex 50w Firmware Zyxel atp800 Firmware Zyxel atp700 Zyxel usg Flex 100ax Zyxel usg Flex 50 Zyxel usg Flex 50 Firmware Zyxel usg Flex 500 Firmware Zyxel atp100w Firmware Zyxel atp100w Zyxel usg Flex 500h Zyxel atp500 Zyxel usg Flex 200 Zyxel atp700 Firmware Zyxel usg Flex 200 Firmware Zyxel usg Flex 500h Firmware Zyxel usg Flex 200h Zyxel atp200 Firmware |
|
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024 - Vendor Advisory | |
CPE | cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200hp:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:5.37:patch1:*:*:*:*:*:* |
Information
Published : 2024-02-20 02:15
Updated : 2025-01-21 18:47
NVD link : CVE-2023-6397
Mitre link : CVE-2023-6397
CVE.ORG link : CVE-2023-6397
JSON object : View
Products Affected
zyxel
- atp800_firmware
- atp500
- atp700_firmware
- usg_flex_100w
- usg_flex_500
- usg_flex_200_firmware
- atp100
- usg_flex_700
- usg_flex_200
- atp100w
- usg_flex_100h
- usg_flex_200h_firmware
- usg_flex_50
- usg_flex_50_firmware
- usg_flex_50w
- usg_flex_700h_firmware
- atp100w_firmware
- usg_flex_100h_firmware
- usg_flex_500_firmware
- usg_flex_700h
- atp100_firmware
- usg_flex_200hp_firmware
- atp500_firmware
- usg_flex_100_firmware
- usg_flex_100
- atp200
- usg_flex_700_firmware
- usg_flex_500h_firmware
- usg_flex_200hp
- usg_flex_50w_firmware
- usg_flex_200h
- atp800
- usg_flex_100ax_firmware
- usg_flex_500h
- usg_flex_100w_firmware
- atp200_firmware
- usg_flex_100ax
- atp700
CWE
CWE-476
NULL Pointer Dereference