A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
History
21 Jan 2025, 18:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | NVD-CWE-noinfo | |
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024 - Vendor Advisory | |
First Time |
Zyxel atp200 Firmware
Zyxel uos Zyxel usg Flex 700 Zyxel usg Flex 100 Firmware Zyxel usg Flex 50 Firmware Zyxel usg Flex 200h Firmware Zyxel atp100w Zyxel usg20w-vpn Zyxel usg Flex 700h Firmware Zyxel atp500 Firmware Zyxel atp700 Firmware Zyxel usg Flex 100ax Firmware Zyxel usg Flex 100h Firmware Zyxel usg Flex 700h Zyxel atp800 Zyxel usg20-vpn Zyxel usg Flex 100ax Zyxel usg Flex 100w Zyxel usg Flex 500 Firmware Zyxel atp100 Firmware Zyxel usg20w-vpn Firmware Zyxel Zyxel usg Flex 200hp Zyxel usg Flex 100h Zyxel usg Flex 100w Firmware Zyxel usg Flex 200 Zyxel atp500 Zyxel usg Flex 100hp Zyxel usg Flex 700 Firmware Zyxel atp100w Firmware Zyxel usg Flex 50w Zyxel atp100 Zyxel atp700 Zyxel usg Flex 200h Zyxel usg Flex 500 Zyxel usg Flex 50w Firmware Zyxel usg Flex 200 Firmware Zyxel usg20-vpn Firmware Zyxel usg Flex 50 Zyxel usg Flex 100 Zyxel usg Flex 500h Zyxel atp200 Zyxel usg Flex 500h Firmware Zyxel atp800 Firmware Zyxel usg Flex 200hp Firmware |
|
CPE | cpe:2.3:h:zyxel:usg_flex_700h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20w-vpn_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:uos:1.10:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:uos:1.10:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100h:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100hp:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200hp:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:5.37:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200hp_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200h:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20w-vpn_firmware:5.37:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* |
21 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled. |
20 Feb 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-20 02:15
Updated : 2025-01-21 18:36
NVD link : CVE-2023-6399
Mitre link : CVE-2023-6399
JSON object : View
Products Affected
zyxel
- usg_flex_100h_firmware
- usg_flex_200hp_firmware
- atp200_firmware
- usg_flex_500
- atp500_firmware
- usg_flex_100ax_firmware
- usg_flex_100h
- usg20-vpn
- atp100_firmware
- usg_flex_200_firmware
- usg_flex_200hp
- usg_flex_50
- atp700
- usg_flex_500h
- usg_flex_100ax
- usg_flex_500_firmware
- atp200
- usg20-vpn_firmware
- atp500
- usg_flex_500h_firmware
- atp700_firmware
- usg_flex_50w_firmware
- usg_flex_700h
- atp800
- usg_flex_700_firmware
- uos
- usg_flex_200h
- usg_flex_50w
- usg_flex_200h_firmware
- usg_flex_100w_firmware
- atp100
- atp100w
- usg_flex_100
- usg_flex_100_firmware
- usg_flex_700
- usg_flex_50_firmware
- usg_flex_200
- usg_flex_700h_firmware
- usg_flex_100w
- usg20w-vpn_firmware
- usg_flex_100hp
- atp100w_firmware
- usg20w-vpn
- atp800_firmware
CWE