A format string vulnerability in a function of the IPSec VPN feature in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an attacker to achieve unauthorized remote code execution by sending a sequence of specially crafted payloads containing an invalid pointer; however, such an attack would require detailed knowledge of an affected device’s memory layout and configuration.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
History
21 Jan 2025, 18:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20w-vpn_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20w-vpn_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200hp:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* |
|
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024 - Vendor Advisory | |
First Time |
Zyxel usg20w-vpn
Zyxel usg Flex 100 Zyxel usg20-vpn Zyxel atp500 Firmware Zyxel atp100 Firmware Zyxel atp100 Zyxel usg Flex 100ax Firmware Zyxel usg Flex 700h Firmware Zyxel usg Flex 100 Firmware Zyxel usg Flex 700 Firmware Zyxel usg Flex 200hp Zyxel usg Flex 100w Firmware Zyxel usg Flex 700h Zyxel usg Flex 100w Zyxel atp200 Zyxel usg Flex 100h Firmware Zyxel usg Flex 50w Zyxel usg Flex 200hp Firmware Zyxel usg Flex 700 Zyxel Zyxel usg Flex 200h Firmware Zyxel usg Flex 100h Zyxel atp800 Zyxel usg Flex 500 Zyxel usg Flex 50w Firmware Zyxel atp800 Firmware Zyxel atp700 Zyxel usg Flex 100ax Zyxel usg20w-vpn Firmware Zyxel usg Flex 50 Zyxel usg Flex 50 Firmware Zyxel usg Flex 500 Firmware Zyxel atp100w Firmware Zyxel atp100w Zyxel usg Flex 500h Zyxel atp500 Zyxel usg Flex 200 Zyxel atp700 Firmware Zyxel usg Flex 200 Firmware Zyxel usg Flex 500h Firmware Zyxel usg Flex 200h Zyxel atp200 Firmware Zyxel usg20-vpn Firmware |
Information
Published : 2024-02-20 03:15
Updated : 2025-01-21 18:35
NVD link : CVE-2023-6764
Mitre link : CVE-2023-6764
CVE.ORG link : CVE-2023-6764
JSON object : View
Products Affected
zyxel
- atp800_firmware
- atp500
- atp700_firmware
- usg_flex_100w
- usg_flex_500
- usg20w-vpn
- usg_flex_200_firmware
- atp100
- usg_flex_700
- usg20-vpn
- usg_flex_200
- atp100w
- usg_flex_100h
- usg_flex_200h_firmware
- usg_flex_50
- usg_flex_50_firmware
- usg_flex_50w
- usg_flex_700h_firmware
- atp100w_firmware
- usg_flex_100h_firmware
- usg_flex_500_firmware
- usg_flex_700h
- atp100_firmware
- usg_flex_200hp_firmware
- atp500_firmware
- usg_flex_100_firmware
- usg_flex_100
- usg20-vpn_firmware
- atp200
- usg_flex_700_firmware
- usg_flex_500h_firmware
- usg_flex_200hp
- usg_flex_50w_firmware
- usg_flex_200h
- usg20w-vpn_firmware
- atp800
- usg_flex_100ax_firmware
- usg_flex_500h
- usg_flex_100w_firmware
- atp200_firmware
- usg_flex_100ax
- atp700
CWE
CWE-134
Use of Externally-Controlled Format String