CVE-2023-6399
20.02.2024, 02:15
A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, andUSG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the deviceid daemon by sending a crafted hostname to an affected device if it has the Device Insight feature enabled.Enginsight
Vendor | Product | Version |
---|---|---|
zyxel | atp100_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | atp100_firmware | 5.37 |
zyxel | atp100_firmware | 5.37:patch1 |
zyxel | atp100w_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | atp100w_firmware | 5.37 |
zyxel | atp100w_firmware | 5.37:patch1 |
zyxel | atp200_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | atp200_firmware | 5.37 |
zyxel | atp200_firmware | 5.37:patch1 |
zyxel | atp500_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | atp500_firmware | 5.37 |
zyxel | atp500_firmware | 5.37:patch1 |
zyxel | atp700_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | atp700_firmware | 5.37 |
zyxel | atp700_firmware | 5.37:patch1 |
zyxel | atp800_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | atp800_firmware | 5.37 |
zyxel | atp800_firmware | 5.37:patch1 |
zyxel | usg_flex_100_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_100_firmware | 5.37 |
zyxel | usg_flex_100_firmware | 5.37:patch1 |
zyxel | usg_flex_100ax_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_100ax_firmware | 5.37 |
zyxel | usg_flex_100ax_firmware | 5.37:patch1 |
zyxel | usg_flex_100h_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_100h_firmware | 5.37 |
zyxel | usg_flex_100h_firmware | 5.37:patch1 |
zyxel | usg_flex_100w_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_100w_firmware | 5.37 |
zyxel | usg_flex_100w_firmware | 5.37:patch1 |
zyxel | usg_flex_200_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_200_firmware | 5.37 |
zyxel | usg_flex_200_firmware | 5.37:patch1 |
zyxel | usg_flex_200h_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_200h_firmware | 5.37 |
zyxel | usg_flex_200h_firmware | 5.37:patch1 |
zyxel | usg_flex_200hp_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_200hp_firmware | 5.37 |
zyxel | usg_flex_200hp_firmware | 5.37:patch1 |
zyxel | usg_flex_500_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_500_firmware | 5.37 |
zyxel | usg_flex_500_firmware | 5.37:patch1 |
zyxel | usg_flex_500h_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_500h_firmware | 5.37 |
zyxel | usg_flex_500h_firmware | 5.37:patch1 |
zyxel | usg_flex_700_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_700_firmware | 5.37 |
zyxel | usg_flex_700_firmware | 5.37:patch1 |
zyxel | usg_flex_700h_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_700h_firmware | 5.37 |
zyxel | usg_flex_700h_firmware | 5.37:patch1 |
zyxel | usg_flex_50_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_50_firmware | 5.37 |
zyxel | usg_flex_50_firmware | 5.37:patch1 |
zyxel | usg_flex_50w_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_50w_firmware | 5.37 |
zyxel | usg_flex_50w_firmware | 5.37:patch1 |
zyxel | usg20-vpn_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg20-vpn_firmware | 5.37 |
zyxel | usg20-vpn_firmware | 5.37:patch1 |
zyxel | usg20w-vpn_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | usg20w-vpn_firmware | 5.37 |
zyxel | usg20w-vpn_firmware | 5.37:patch1 |
zyxel | uos | 1.10 |
zyxel | uos | 1.10:patch1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration