First published: Tue Sep 03 2024(Updated: )
A command injection vulnerability in the IPSec VPN feature of Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an unauthenticated attacker to execute some OS commands on an affected device by sending a crafted username to the vulnerable device. Note that this attack could be successful only if the device was configured in User-Based-PSK authentication mode and a valid user with a long username exceeding 28 characters exists.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel Zld | >=4.32<5.39 | |
Any of | ||
Zyxel Atp100 | ||
Zyxel Atp100w | ||
Zyxel ATP200 | ||
Zyxel Atp500 | ||
Zyxel Atp700 | ||
Zyxel Atp800 | ||
All of | ||
Zyxel Zld | >=4.50<5.39 | |
Any of | ||
Zyxel Usg Flex 100 | ||
Zyxel Usg Flex 100ax | ||
Zyxel Usg Flex 100w | ||
Zyxel Usg Flex 200 | ||
Zyxel Usg Flex 50 | ||
Zyxel Usg Flex 500 | ||
Zyxel Usg Flex 700 | ||
All of | ||
Zyxel Zld | >=4.16<5.39 | |
Zyxel Usg Flex 50w | ||
All of | ||
Zyxel Zld | >=4.16<5.39 | |
Zyxel Usg 20w-vpn |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.