The configuration parser of Zyxel ATP series firmware versions 5.10 through 5.35, USG FLEX series firmware versions 5.00 through 5.35, USG FLEX 50(W) firmware versions 5.10 through 5.35, USG20(W)-VPN firmware versions 5.10 through 5.35, and VPN series firmware versions 5.00 through 5.35, which fails to properly sanitize user input. A remote unauthenticated attacker could leverage the vulnerability to modify device configuration data, resulting in DoS conditions on an affected device if the attacker could trick an authorized administrator to switch the management mode to the cloud mode.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2025-02-12T16:42:02.320Z
Reserved: 2023-01-10T00:00:00.000Z
Link: CVE-2023-22916

Updated: 2024-08-02T10:20:31.475Z

Status : Modified
Published: 2023-04-24T17:15:09.767
Modified: 2024-11-21T07:45:38.620
Link: CVE-2023-22916

No data.