First published: Tue Jul 19 2022(Updated: )
A directory traversal vulnerability caused by specific character sequences within an improperly sanitized URL was identified in some CGI programs of Zyxel USG FLEX 100(W) firmware versions 4.50 through 5.30, USG FLEX 200 firmware versions 4.50 through 5.30, USG FLEX 500 firmware versions 4.50 through 5.30, USG FLEX 700 firmware versions 4.50 through 5.30, USG FLEX 50(W) firmware versions 4.16 through 5.30, USG20(W)-VPN firmware versions 4.16 through 5.30, ATP series firmware versions 4.32 through 5.30, VPN series firmware versions 4.30 through 5.30, USG/ZyWALL series firmware versions 4.11 through 4.72, that could allow an authenticated attacker to access some restricted files on a vulnerable device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel USG FLEX 100w firmware | >=4.50<=5.30 | |
Zyxel USG FLEX 100w firmware | ||
Zyxel USG FLEX firmware | >=4.50<=5.30 | |
Zyxel USG FLEX 200 firmware | ||
Zyxel USG FLEX firmware | >=4.50<=5.30 | |
Zyxel USG FLEX 500 firmware | ||
Zyxel USG FLEX firmware | >=4.50<=5.30 | |
Zyxel USG FLEX 700 firmware | ||
Zyxel USG FLEX 50w | >=4.20<=5.30 | |
Zyxel USG FLEX 50(W) series firmware | ||
Zyxel USG 20W-VPN Firmware | >=4.20<=5.30 | |
Zyxel USG20W-VPN Firmware | ||
Zyxel Zywall ATP800 Firmware | >=4.32<=5.30 | |
Zyxel Zywall ATP800 Firmware | ||
Zyxel Zywall ATP700 | >=4.32<=5.30 | |
Zyxel ATP700 Firmware | ||
Zyxel ATP500 Firmware | >=4.32<=5.30 | |
Zyxel ATP500 Firmware | ||
Zyxel ATP200 firmware | >=4.32<=5.30 | |
Zyxel Zywall ATP200 | ||
Zyxel ATP100W Firmware | >=4.32<=5.30 | |
Zyxel ATP100W Firmware | ||
Zyxel ZyWall ATP100 Firmware | >=4.32<=5.30 | |
Zyxel ATP100 Firmware | ||
Zyxel VPN1000 Firmware | >=4.30<=5.30 | |
Zyxel VPN1000 Firmware | ||
Zyxel Zywall VPN 300 Firmware | >=4.30<=5.30 | |
Zyxel Zywall VPN300 | ||
Zyxel VPN100 | >=4.30<=5.30 | |
Zyxel Zywall VPN100 | ||
Zyxel Zywall VPN 50 Firmware | >=4.30<=5.30 | |
Zyxel VPN50 Firmware | ||
Zyxel USG20W-VPN Firmware | >=4.30<=5.30 | |
Zyxel USG20W-VPN Firmware | ||
Zyxel USG2200-VPN Firmware | >=4.30<=5.30 | |
Zyxel USG2200-VPN Firmware | ||
Zyxel Zywall 1100 Firmware | >=4.30<=5.30 | |
Zyxel Zywall 110 firmware | ||
Zyxel ZyWALL USG 310 firmware | >=4.30<=5.30 | |
Zyxel Zywall 310 Firmware | ||
Zyxel Zywall 1100 Firmware | >=4.30<=5.30 | |
Zyxel Zywall 1100 Firmware | ||
Zyxel USG 40 firmware | >=4.20<=4.72 | |
Zyxel USG 40 | ||
Zyxel USG 40w firmware | >=4.20<=4.72 | |
Zyxel USG 40w firmware | ||
Zyxel USG 60W firmware | >=4.20<=4.72 | |
Zyxel USG 60 | ||
Zyxel USG 60W firmware | >=4.20<=4.72 | |
Zyxel USG 60W firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2030 is a directory traversal vulnerability caused by specific character sequences within an improperly sanitized URL in Zyxel USG FLEX and other affected firmware versions.
CVE-2022-2030 has a severity value of 6.5, which is considered medium severity.
Zyxel USG FLEX 100(W) firmware versions 4.50 through 5.30, USG FLEX 200 firmware versions 4.50 through 5.30, and USG FLEX 500 firmware versions 4.50 through 5.30 are affected by CVE-2022-2030.
To fix CVE-2022-2030, it is recommended to update your affected Zyxel USG FLEX firmware versions to 5.40 or higher.
You can find more information about CVE-2022-2030 in the Zyxel security advisory on their official website.