CVE-2022-0734

A cross-site scripting vulnerability was identified in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.35 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.35 through 5.20, and VPN series firmware versions 4.35 through 5.20, that could allow an attacker to obtain some information stored in the user's browser, such as cookies or session tokens, via a malicious script.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:zyxel:usg_110_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_110:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:zyxel:usg_1100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_1100:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:zyxel:usg_1900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_1900:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:zyxel:usg_20w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_20w:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:zyxel:usg_2200-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_2200-vpn:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:zyxel:usg_310_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_310:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:zyxel:usg_40_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_40:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:zyxel:usg_40w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_40w:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:zyxel:usg_60_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_60:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:zyxel:usg_60w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_60w:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:zyxel:usg200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg200:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:zyxel:usg20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg20:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:zyxel:usg210_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:zyxel:usg2200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg2200:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:zyxel:usg300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg300:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:zyxel:usg310_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 5.8
References () https://www.zyxel.com/support/multiple-vulnerabilities-of-firewalls-AP-controllers-and-APs.shtml - Vendor Advisory () https://www.zyxel.com/support/multiple-vulnerabilities-of-firewalls-AP-controllers-and-APs.shtml - Vendor Advisory

Information

Published : 2022-05-24 03:15

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0734

Mitre link : CVE-2022-0734

CVE.ORG link : CVE-2022-0734


JSON object : View

Products Affected

zyxel

  • usg_310_firmware
  • vpn50
  • usg_20w-vpn_firmware
  • vpn300
  • atp100_firmware
  • usg210
  • usg_flex_700
  • usg200_firmware
  • usg_60w_firmware
  • usg200
  • usg310_firmware
  • usg20_firmware
  • vpn50_firmware
  • usg310
  • usg_2200-vpn_firmware
  • usg_40w_firmware
  • usg_40w
  • atp100w
  • usg_flex_200_firmware
  • vpn100
  • atp500_firmware
  • vpn100_firmware
  • vpn300_firmware
  • atp100w_firmware
  • atp200_firmware
  • usg_1900_firmware
  • usg_20w
  • usg_40_firmware
  • usg_310
  • usg_flex_100_firmware
  • usg_flex_100
  • atp700
  • usg_flex_700_firmware
  • usg_flex_500
  • usg2200_firmware
  • atp100
  • usg_110
  • usg_1100_firmware
  • usg_flex_200
  • usg_60w
  • usg300
  • usg_110_firmware
  • usg_20w-vpn
  • usg2200
  • atp700_firmware
  • usg300_firmware
  • usg_20w_firmware
  • usg_flex_100w_firmware
  • usg_2200-vpn
  • atp500
  • usg_60_firmware
  • usg_flex_100w
  • usg20
  • usg_1900
  • usg_60
  • usg210_firmware
  • usg_1100
  • usg_flex_500_firmware
  • vpn1000_firmware
  • atp200
  • atp800_firmware
  • atp800
  • usg_40
  • vpn1000
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')