CVE-2023-6399

A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, andUSG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the deviceid daemon by sending a crafted hostname to an affected device if it has the Device Insight feature enabled.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.7 MEDIUM
ADJACENT_NETWORK
LOW
LOW
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
ZyxelCNA
5.7 MEDIUM
ADJACENT_NETWORK
LOW
LOW
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 53%
VendorProductVersion
zyxelatp100_firmware
5.10 ≤
𝑥
< 5.37
zyxelatp100_firmware
5.37
zyxelatp100_firmware
5.37:patch1
zyxelatp100w_firmware
5.10 ≤
𝑥
< 5.37
zyxelatp100w_firmware
5.37
zyxelatp100w_firmware
5.37:patch1
zyxelatp200_firmware
5.10 ≤
𝑥
< 5.37
zyxelatp200_firmware
5.37
zyxelatp200_firmware
5.37:patch1
zyxelatp500_firmware
5.10 ≤
𝑥
< 5.37
zyxelatp500_firmware
5.37
zyxelatp500_firmware
5.37:patch1
zyxelatp700_firmware
5.10 ≤
𝑥
< 5.37
zyxelatp700_firmware
5.37
zyxelatp700_firmware
5.37:patch1
zyxelatp800_firmware
5.10 ≤
𝑥
< 5.37
zyxelatp800_firmware
5.37
zyxelatp800_firmware
5.37:patch1
zyxelusg_flex_100_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_100_firmware
5.37
zyxelusg_flex_100_firmware
5.37:patch1
zyxelusg_flex_100ax_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_100ax_firmware
5.37
zyxelusg_flex_100ax_firmware
5.37:patch1
zyxelusg_flex_100h_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_100h_firmware
5.37
zyxelusg_flex_100h_firmware
5.37:patch1
zyxelusg_flex_100w_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_100w_firmware
5.37
zyxelusg_flex_100w_firmware
5.37:patch1
zyxelusg_flex_200_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_200_firmware
5.37
zyxelusg_flex_200_firmware
5.37:patch1
zyxelusg_flex_200h_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_200h_firmware
5.37
zyxelusg_flex_200h_firmware
5.37:patch1
zyxelusg_flex_200hp_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_200hp_firmware
5.37
zyxelusg_flex_200hp_firmware
5.37:patch1
zyxelusg_flex_500_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_500_firmware
5.37
zyxelusg_flex_500_firmware
5.37:patch1
zyxelusg_flex_500h_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_500h_firmware
5.37
zyxelusg_flex_500h_firmware
5.37:patch1
zyxelusg_flex_700_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_700_firmware
5.37
zyxelusg_flex_700_firmware
5.37:patch1
zyxelusg_flex_700h_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_700h_firmware
5.37
zyxelusg_flex_700h_firmware
5.37:patch1
zyxelusg_flex_50_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_50_firmware
5.37
zyxelusg_flex_50_firmware
5.37:patch1
zyxelusg_flex_50w_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg_flex_50w_firmware
5.37
zyxelusg_flex_50w_firmware
5.37:patch1
zyxelusg20-vpn_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg20-vpn_firmware
5.37
zyxelusg20-vpn_firmware
5.37:patch1
zyxelusg20w-vpn_firmware
5.10 ≤
𝑥
< 5.37
zyxelusg20w-vpn_firmware
5.37
zyxelusg20w-vpn_firmware
5.37:patch1
zyxeluos
1.10
zyxeluos
1.10:patch1
𝑥
= Vulnerable software versions