CVE-2023-6399
Severity CVSS v4.0:
Pending analysis
Type:
CWE-134
Format String Vulnerability
Publication date:
20/02/2024
Last modified:
21/01/2025
Description
A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled.
Impact
Base Score 3.x
5.70
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* | 5.10 (including) | 5.37 (excluding) |
cpe:2.3:o:zyxel:atp100_firmware:5.37:-:*:*:*:*:*:* | ||
cpe:2.3:o:zyxel:atp100_firmware:5.37:patch1:*:*:*:*:*:* | ||
cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* | 5.10 (including) | 5.37 (excluding) |
cpe:2.3:o:zyxel:atp100w_firmware:5.37:-:*:*:*:*:*:* | ||
cpe:2.3:o:zyxel:atp100w_firmware:5.37:patch1:*:*:*:*:*:* | ||
cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* | 5.10 (including) | 5.37 (excluding) |
cpe:2.3:o:zyxel:atp200_firmware:5.37:-:*:*:*:*:*:* | ||
cpe:2.3:o:zyxel:atp200_firmware:5.37:patch1:*:*:*:*:*:* | ||
cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* | 5.10 (including) | 5.37 (excluding) |
cpe:2.3:o:zyxel:atp500_firmware:5.37:-:*:*:*:*:*:* | ||
cpe:2.3:o:zyxel:atp500_firmware:5.37:patch1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page