8.8

CVE-2023-33011

A format string vulnerability in the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2,  USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted PPPoE configuration on an affected device when the cloud management mode is enabled.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ZyxelUsg 2200-vpn Firmware Version >= 5.00 < 5.37
   ZyxelUsg 2200-vpn Version-
ZyxelUsg Flex 100 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 100 Version-
ZyxelUsg Flex 100w Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 100w Version-
ZyxelUsg Flex 200 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 200 Version-
ZyxelUsg Flex 50 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 50 Version-
ZyxelUsg Flex 500 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 500 Version-
ZyxelUsg Flex 50w Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 50w Version-
ZyxelUsg Flex 700 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 700 Version-
ZyxelZywall Vpn100 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn100 Version-
ZyxelZywall Vpn2s Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn2s Version-
ZyxelZywall Vpn300 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn300 Version-
ZyxelZywall Vpn50 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn50 Version-
ZyxelZywall Vpn 100 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn 100 Version-
ZyxelZywall Vpn 300 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn 300 Version-
ZyxelZywall Vpn 50 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn 50 Version-
ZyxelUsg 20w-vpn Firmware Version >= 5.10 < 5.37
   ZyxelUsg 20w-vpn Version-
ZyxelZywall Atp100 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp100 Version-
ZyxelZywall Atp100w Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp100w Version-
ZyxelZywall Atp200 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp200 Version-
ZyxelZywall Atp500 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp500 Version-
ZyxelZywall Atp700 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp700 Version-
ZyxelZywall Atp800 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp800 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.12% 0.316
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security@zyxel.com.tw 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-134 Use of Externally-Controlled Format String

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.