An improper input validation vulnerability in the “Quagga” package of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to access configuration files on an affected device.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 08:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps - Vendor Advisory |
04 Dec 2023, 18:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps - Vendor Advisory | |
First Time |
Zyxel vpn1000
Zyxel atp200 Zyxel Zyxel usg Flex 700 Zyxel vpn50 Zyxel atp100 Zyxel usg Flex 100w Zyxel vpn50w Zyxel vpn100 Zyxel atp700 Zyxel usg Flex 50w Zyxel vpn300 Zyxel atp100w Zyxel atp800 Zyxel usg Flex 100 Zyxel usg Flex 500 Zyxel usg 20w-vpn Zyxel zld Zyxel usg Flex 200 Zyxel atp500 Zyxel usg Flex 50 |
|
CPE | cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* |
28 Nov 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-28 02:15
Updated : 2024-11-21 08:08
NVD link : CVE-2023-35136
Mitre link : CVE-2023-35136
CVE.ORG link : CVE-2023-35136
JSON object : View
Products Affected
zyxel
- vpn50
- vpn300
- usg_flex_700
- usg_flex_50
- atp100w
- zld
- vpn100
- usg_flex_100
- atp700
- usg_flex_500
- atp100
- usg_flex_200
- usg_20w-vpn
- usg_flex_100w
- atp500
- vpn50w
- atp200
- atp800
- vpn1000
- usg_flex_50w
CWE
CWE-20
Improper Input Validation