First published: Tue Sep 03 2024(Updated: )
A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.60 through V5.38 and USG FLEX series firmware versions from V4.60 through V5.38 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device by executing a crafted CLI command.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel ZLD Firmware | >=4.60<5.39 | |
Any of | ||
Zyxel ATP100 Firmware | ||
Zyxel ATP100W Firmware | ||
Zyxel Zywall ATP200 | ||
Zyxel ATP500 Firmware | ||
Zyxel ATP700 Firmware | ||
Zyxel ATP series firmware | ||
All of | ||
Zyxel ZLD Firmware | >=4.60<5.39 | |
Any of | ||
Zyxel USG Flex 100 firmware | ||
Zyxel USG FLEX 100ax firmware | ||
Zyxel USG FLEX 100w firmware | ||
Zyxel USG FLEX 200 firmware | ||
Zyxel USG FLEX 50w | ||
Zyxel USG FLEX 500 firmware | ||
Zyxel USG FLEX 50(W) series firmware | ||
Zyxel USG FLEX 700 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7203 is rated as a high severity vulnerability due to the potential for code execution by authenticated attackers.
To mitigate CVE-2024-7203, update the Zyxel ATP series and USG FLEX series firmware to versions after V5.38.
CVE-2024-7203 affects Zyxel ATP series firmware versions from V4.60 through V5.38 and USG FLEX series firmware versions from V4.60 through V5.38.
CVE-2024-7203 may allow an authenticated attacker with administrator privileges to execute operating system commands on vulnerable devices.
CVE-2024-7203 does not enable remote access; it requires authentication with administrator privileges.