CVE-2023-6399Use of Externally-Controlled Format String in Zyxel Atp100 Firmware

Severity
6.5MEDIUMNVD
CNA5.7
EPSS
0.3%
top 46.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 20

Description

A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted ho

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages27 packages

CVEListV5zyxel/usg_flex_series_firmwareversion 4.50 through 5.37 Patch 1
CVEListV5zyxel/usg_flex_h_series_firmwareversion 1.10 through 1.10 Patch 1
CVEListV5zyxel/usg_flex_50_series_firmwareversion 4.16 through 5.37 Patch 1
CVEListV5zyxel/usg20_vpn_series_firmwareversion 4.16 through 5.37 Patch 1
CVEListV5zyxel/atp_series_firmwareversion 4.32 through 5.37 Patch 1

🔴Vulnerability Details

2
CVEList
CVE-2023-6399: A format string vulnerability in Zyxel ATP series firmware versions from 42024-02-20
GHSA
GHSA-6mfv-h538-gwvr: A format string vulnerability in Zyxel ATP series firmware versions from 42024-02-20
CVE-2023-6399 — Zyxel Atp100 Firmware vulnerability | cvebase