First published: Tue Oct 22 2024(Updated: )
The insufficiently protected credentials vulnerability in the CLI command of the USG FLEX H series uOS firmware version V1.21 and earlier versions could allow an authenticated local attacker to gain privilege escalation by stealing the authentication token of a login administrator. Note that this attack could be successful only if the administrator has not logged out.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel UOS | <1.30 | |
Any of | ||
Zyxel USG FLEX 100h | ||
Zyxel USG FLEX 200h firmware | ||
Zyxel USG FLEX 200hp | ||
Zyxel USG FLEX 500h firmware | ||
Zyxel USG FLEX 700h firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9677 is classified with a severity rating that indicates the potential for privilege escalation due to insufficiently protected credentials.
To remediate CVE-2024-9677, it is advised to upgrade the USG FLEX H series uOS firmware to version 1.30 or later.
The vulnerability CVE-2024-9677 affects users of the USG FLEX H series devices running uOS firmware version V1.21 and earlier.
CVE-2024-9677 allows an authenticated local attacker to perform privilege escalation by stealing the authentication token of an administrator.
You would be vulnerable to CVE-2024-9677 if your USG FLEX H series device is using uOS firmware version V1.21 or earlier.