First published: Sun Dec 27 2020(Updated: )
Certain Zyxel products allow command injection by an admin via an input string to chg_exp_pwd during a password-change action. This affects VPN On-premise before ZLD V4.39 week38, VPN Orchestrator before SD-OS V10.03 week32, USG before ZLD V4.39 week38, USG FLEX before ZLD V4.55 week38, ATP before ZLD V4.55 week38, and NSG before 1.33 patch 4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel Vpn Orchestrator | <10.03 | |
Zyxel Zld | <4.39 | |
Zyxel Zld | <4.55 | |
Zyxel Usg Flex | ||
Zyxel ATP | ||
Zyxel Nsg Firmware | <1.33 | |
Zyxel Nsg Firmware | =1.33 | |
Zyxel Nsg Firmware | =1.33-patch1 | |
Zyxel Nsg | ||
Zyxel Usg Flex Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29299 is a vulnerability that allows command injection by an admin via an input string to chg_exp_pwd during a password-change action.
Zyxel VPN On-premise (before ZLD V4.39 week38), VPN Orchestrator (before SD-OS V10.03 week32), USG (before ZLD V4.39 week38), and USG FLEX (before ZLD V4.55 week38) are affected by CVE-2020-29299.
The severity of CVE-2020-29299 is critical with a severity score of 7.2.
To fix CVE-2020-29299, it is recommended to apply the necessary patches and updates provided by Zyxel.
More information about CVE-2020-29299 can be found on the Zyxel support website and the Zyxel security advisories page.