CVE-2023-6764












A format string vulnerability in a function of the IPSec VPN feature in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an attacker to achieve unauthorized remote code execution by sending a sequence of specially crafted payloads containing an invalid pointer; however, such an attack would require detailed knowledge of an affected devices memory layout and configuration.



ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
ZyxelCNA
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
zyxelatp100_firmware
4.32 ≤
𝑥
< 5.37
zyxelatp100_firmware
5.37
zyxelatp100_firmware
5.37:patch1
zyxelatp100w_firmware
4.32 ≤
𝑥
< 5.37
zyxelatp100w_firmware
5.37
zyxelatp100w_firmware
5.37:patch1
zyxelatp200_firmware
4.32 ≤
𝑥
< 5.37
zyxelatp200_firmware
5.37
zyxelatp200_firmware
5.37:patch1
zyxelatp500_firmware
4.32 ≤
𝑥
< 5.37
zyxelatp500_firmware
5.37
zyxelatp500_firmware
5.37:patch1
zyxelatp700_firmware
4.32 ≤
𝑥
< 5.37
zyxelatp700_firmware
5.37
zyxelatp700_firmware
5.37:patch1
zyxelatp800_firmware
4.32 ≤
𝑥
< 5.37
zyxelatp800_firmware
5.37
zyxelatp800_firmware
5.37:patch1
zyxelusg_flex_100_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_100_firmware
5.37
zyxelusg_flex_100_firmware
5.37:patch1
zyxelusg_flex_100ax_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_100ax_firmware
5.37
zyxelusg_flex_100ax_firmware
5.37:patch1
zyxelusg_flex_100h_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_100h_firmware
5.37
zyxelusg_flex_100h_firmware
5.37:patch1
zyxelusg_flex_100w_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_100w_firmware
5.37
zyxelusg_flex_100w_firmware
5.37:patch1
zyxelusg_flex_200_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_200_firmware
5.37
zyxelusg_flex_200_firmware
5.37:patch1
zyxelusg_flex_200h_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_200h_firmware
5.37
zyxelusg_flex_200h_firmware
5.37:patch1
zyxelusg_flex_200hp_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_200hp_firmware
5.37
zyxelusg_flex_200hp_firmware
5.37:patch1
zyxelusg_flex_500_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_500_firmware
5.37
zyxelusg_flex_500_firmware
5.37:patch1
zyxelusg_flex_500h_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_500h_firmware
5.37
zyxelusg_flex_500h_firmware
5.37:patch1
zyxelusg_flex_700_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_700_firmware
5.37
zyxelusg_flex_700_firmware
5.37:patch1
zyxelusg_flex_700h_firmware
4.50 ≤
𝑥
< 5.37
zyxelusg_flex_700h_firmware
5.37
zyxelusg_flex_700h_firmware
5.37:patch1
zyxelusg_flex_50_firmware
4.16 ≤
𝑥
< 5.37
zyxelusg_flex_50_firmware
5.37
zyxelusg_flex_50_firmware
5.37:patch1
zyxelusg_flex_50w_firmware
4.16 ≤
𝑥
< 5.37
zyxelusg_flex_50w_firmware
5.37
zyxelusg_flex_50w_firmware
5.37:patch1
zyxelusg20-vpn_firmware
4.16 ≤
𝑥
< 5.37
zyxelusg20-vpn_firmware
5.37
zyxelusg20-vpn_firmware
5.37:patch1
zyxelusg20w-vpn_firmware
4.16 ≤
𝑥
< 5.37
zyxelusg20w-vpn_firmware
5.37
zyxelusg20w-vpn_firmware
5.37:patch1
𝑥
= Vulnerable software versions