Page 2 of 8 results (0.002 seconds)

CVSS: 5.5EPSS: 0%CPEs: 61EXPL: 0

An improper privilege management vulnerability in the debug CLI command of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, VPN series firmware versions 4.30 through 5.37, NWA50AX firmware version 6.29(ABYW.2), WAC500 firmware version 6.65(ABVS.1), WAX300H firmware version 6.60(ACHF.1), and WBE660S firmware version 6.65(ACGG.1), could allow an authenticated local attacker to access system files on an affected device. Una vulnerabilidad de administración de privilegios inadecuada en el comando CLI de depuración de las versiones de firmware: serie Zyxel ATP 4.32 a 5.37, serie USG FLEX 4.50 a 5.37, serie USG FLEX 50(W) 4.16 a 5.37, serie USG20(W)-VPN 4.16 a 5.37, serie VPN 4.30 a 5.37, NWA50AX 6.29 (ABYW.2), WAC500 6.65 (ABVS.1), WAX300H 6.60 (ACHF.1) y WBE660S 6.65 ( ACGG.1). Podría permitir que un atacante local autenticado acceda a los archivos del sistema en un dispositivo afectado. • https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps • CWE-269: Improper Privilege Management •

CVSS: 5.5EPSS: 0%CPEs: 23EXPL: 0

An improper input validation vulnerability in the “Quagga” package of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to access configuration files on an affected device. Una vulnerabilidad de validación de entrada incorrecta en el paquete “Quagga” de las versiones de firmware: serie Zyxel ATP 4.32 a 5.37, serie USG FLEX 4.50 a 5.37, serie USG FLEX 50(W) 4.16 a 5.37, USG20(W)-VPN. Las versiones de firmware de la serie 4.16 a 5.37 y las versiones de firmware de la serie VPN 4.30 a 5.37 podrían permitir que un atacante local autenticado acceda a los archivos de configuración en un dispositivo afectado. • https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 0%CPEs: 13EXPL: 0

Certain Zyxel products allow command injection by an admin via an input string to chg_exp_pwd during a password-change action. This affects VPN On-premise before ZLD V4.39 week38, VPN Orchestrator before SD-OS V10.03 week32, USG before ZLD V4.39 week38, USG FLEX before ZLD V4.55 week38, ATP before ZLD V4.55 week38, and NSG before 1.33 patch 4. Determinados productos Zyxel permiten una inyección de comandos por un administrador por medio de una cadena de entrada a la función chg_exp_pwd durante una acción de cambio de contraseña. Esto afecta a VPN local anterior a ZLD versión V4.39 week38, VPN Orchestrator anterior a SD-OS versión V10.03 week32, USG anterior a ZLD versión V4.39 week38, USG FLEX anterior a ZLD versión V4.55 week38, ATP anterior a ZLD versión V4.55 week38, y NSG anterior a versión 1.33 parche 4 • https://www.zyxel.com/support/Zyxel-security-advisory-for-command-injection-vulnerability-of-firewalls.shtml https://www.zyxel.com/us/en/support/security_advisories.shtml • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •