10

CVE-2022-30525

Warning
Exploit

A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.

Data is provided by the National Vulnerability Database (NVD)
ZyxelUsg Flex 100w Firmware Version >= 5.00 < 5.30
   ZyxelUsg Flex 100w Version-
ZyxelUsg Flex 200 Firmware Version >= 5.00 < 5.30
   ZyxelUsg Flex 200 Version-
ZyxelUsg Flex 500 Firmware Version >= 5.00 <= 5.30
   ZyxelUsg Flex 500 Version-
ZyxelUsg Flex 700 Firmware Version >= 5.00 < 5.30
   ZyxelUsg Flex 700 Version-
ZyxelVpn100 Firmware Version >= 4.60 < 5.30
   ZyxelVpn100 Version-
ZyxelVpn1000 Firmware Version >= 4.60 < 5.30
   ZyxelVpn1000 Version-
ZyxelVpn300 Firmware Version >= 4.60 < 5.30
   ZyxelVpn300 Version-
ZyxelVpn50 Firmware Version >= 4.60 < 5.30
   ZyxelVpn50 Version-
ZyxelAtp100 Firmware Version >= 5.10 < 5.30
   ZyxelAtp100 Version-
ZyxelAtp100w Firmware Version >= 5.10 < 5.30
   ZyxelAtp100w Version-
ZyxelAtp200 Firmware Version >= 5.10 < 5.30
   ZyxelAtp200 Version-
ZyxelAtp500 Firmware Version >= 5.10 < 5.30
   ZyxelAtp500 Version-
ZyxelAtp700 Firmware Version >= 5.10 < 5.30
   ZyxelAtp700 Version-
ZyxelAtp800 Firmware Version >= 5.10 < 5.30
   ZyxelAtp800 Version-
ZyxelUsg Flex 50w Firmware Version >= 5.10 < 5.30
   ZyxelUsg Flex 50w Version-
ZyxelUsg20w-vpn Firmware Version >= 5.10 < 5.30
   ZyxelUsg20w-vpn Version-

16.05.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Zyxel Multiple Firewalls OS Command Injection Vulnerability

Vulnerability

A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.42% 1
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
security@zyxel.com.tw 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.