First published: Tue Nov 12 2024(Updated: )
A buffer overflow vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to cause denial of service (DoS) conditions via a crafted URL.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel GS1900-8 firmware | <2.90\(aahh.0\)c0 | |
Zyxel GS1900-8 | ||
All of | ||
Zyxel GS1900-8HP firmware | <2.90\(aahi.0\)c0 | |
Zyxel GS1900-8HP firmware | ||
All of | ||
Zyxel GS1900-10HP firmware | <2.90\(aazi.0\)c0 | |
Zyxel GS1900-10HP firmware | ||
All of | ||
Zyxel GS1900-16 | <2.90\(aahj.0\)c0 | |
Zyxel GS1900-16 Firmware | ||
All of | ||
ZyXEL GS1900-24 firmware | <2.90\(aahl.0\)c0 | |
Zyxel GS1900-24E Firmware | ||
All of | ||
Zyxel GS1900-24E Firmware | <2.90\(aahk.0\)c0 | |
Zyxel GS1900-24E Firmware | ||
All of | ||
Zyxel GS1900-24EP Firmware | <2.90\(abto.0\)c0 | |
Zyxel GS1900-24EP Firmware | ||
All of | ||
Zyxel GS1900-24HPv2 | <2.90\(abtp.0\)c0 | |
Zyxel GS1900-48HPv2 | ||
All of | ||
Zyxel GS1900-48 Firmware | <2.90\(aahn.0\)c0 | |
Zyxel GS1900-48HP Firmware | ||
All of | ||
Zyxel GS1900-48HPv2 | <2.90\(abtq.0\)c0 | |
Zyxel GS1900-48HPv2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-8882 is considered high due to the potential for denial of service conditions.
To fix CVE-2024-8882, update the firmware of the affected Zyxel switches to version 2.90(aahn.0)c0 or later.
CVE-2024-8882 affects users of the Zyxel GS1900 series switches running firmware version V2.80(AAHN.1)C0 and earlier.
The impact of CVE-2024-8882 is that an authenticated attacker can exploit the vulnerability to cause a denial of service.
An authenticated, LAN-based attacker with administrator privileges can exploit CVE-2024-8882.