A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to cause denial-of-service (DoS) conditions by executing the CLI command to dump system logs on an affected device.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2023-11-28 02:15
Updated : 2023-12-04 18:08
NVD link : CVE-2023-37926
Mitre link : CVE-2023-37926
CVE.ORG link : CVE-2023-37926
JSON object : View
Products Affected
zyxel
- usg_flex_500
- atp200
- vpn100
- atp500
- usg_flex_100w
- zld
- usg_flex_200
- usg_20w-vpn
- atp700
- usg_flex_700
- atp100
- vpn50w
- usg_flex_50
- vpn1000
- vpn50
- atp100w
- usg_flex_100
- atp800
- vpn300
- usg_flex_50w
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')