// For flags

CVE-2023-6398

 

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A post-authentication command injection vulnerability in the file upload binary in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1,

USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1,

NWA50AX firmware versions through 6.29(ABYW.3), WAC500 firmware versions through 6.65(ABVS.1), WAX300H firmware versions through 6.60(ACHF.1), and WBE660S firmware versions through 6.65(ACGG.1) could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device via FTP.

Una vulnerabilidad de inyección de comando posterior a la autenticación en el binario de carga de archivos en las versiones de firmware de la serie Zyxel ATP de 4.32 a 5.37, parche 1, versiones de firmware de la serie USG FLEX de 4.50 a 5.37, parche 1, versiones de firmware de la serie USG FLEX 50(W) de 4.16 a 5.37 Parche 1, versiones de firmware de la serie USG20(W)-VPN desde 4.16 hasta 5.37 Parche 1, versiones de firmware NWA50AX hasta 6.29(ABYW.3), versiones de firmware WAC500 hasta 6.65(ABVS.1), versiones de firmware WAX300H hasta 6.60(ACHF.1 ), y las versiones de firmware WBE660S hasta 6.65 (ACGG.1) podrían permitir que un atacante autenticado con privilegios de administrador ejecute algunos comandos del sistema operativo (SO) en un dispositivo afectado a través de FTP.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-11-30 CVE Reserved
  • 2024-02-20 CVE Published
  • 2024-02-20 EPSS Updated
  • 2024-08-25 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zyxel
Search vendor "Zyxel"
NWA50AX Firmware
Search vendor "Zyxel" for product "NWA50AX Firmware"
< 6.29
Search vendor "Zyxel" for product "NWA50AX Firmware" and version " < 6.29"
en
Affected
Zyxel
Search vendor "Zyxel"
WAC500 Firmware
Search vendor "Zyxel" for product "WAC500 Firmware"
< 6.70
Search vendor "Zyxel" for product "WAC500 Firmware" and version " < 6.70"
en
Affected
Zyxel
Search vendor "Zyxel"
WAX300H Firmware
Search vendor "Zyxel" for product "WAX300H Firmware"
< 6.70
Search vendor "Zyxel" for product "WAX300H Firmware" and version " < 6.70"
en
Affected
Zyxel
Search vendor "Zyxel"
WBE660S Firmware
Search vendor "Zyxel" for product "WBE660S Firmware"
< 6.70
Search vendor "Zyxel" for product "WBE660S Firmware" and version " < 6.70"
en
Affected