Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
Configuration 23 (hide)
AND |
|
01 Apr 2024, 15:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* |
15 Jun 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device. |
07 Jun 2023, 18:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:* |
06 Jun 2023, 20:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:zyxel:atp100_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_40_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_60w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_60_firmware:4.73:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn1000_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_40w_firmware:4.73:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn100_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn50_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_60w_firmware:4.73:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_40_firmware:4.73:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_40w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_40w_firmware:4.73:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn1000_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_60_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_60:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn300_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_60_firmware:4.73:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_40w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_40:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_40_firmware:4.73:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn300_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_60w_firmware:4.73:-:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn50_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn100_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_60w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:5.36:patch1:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:5.36:-:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls - Vendor Advisory | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
24 May 2023, 13:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2023-05-24 13:15
Updated : 2024-04-01 15:51
NVD link : CVE-2023-33009
Mitre link : CVE-2023-33009
CVE.ORG link : CVE-2023-33009
JSON object : View
zyxel
- usg_40
- usg_flex_200_firmware
- usg_40w
- atp100w_firmware
- atp800_firmware
- usg20-vpn
- vpn50
- atp700
- atp800
- usg_20w-vpn_firmware
- usg_flex_50w_firmware
- usg_flex_200
- atp200_firmware
- vpn300
- atp500
- vpn100
- usg_60w_firmware
- usg_60
- vpn1000_firmware
- atp100w
- atp100
- atp500_firmware
- usg_flex_500_firmware
- usg_flex_50
- vpn100_firmware
- usg_flex_100_firmware
- vpn50_firmware
- usg_flex_50w
- usg_40_firmware
- atp200
- usg_40w_firmware
- usg_flex_500
- usg_flex_100
- usg_flex_700_firmware
- usg_flex_100w_firmware
- vpn1000
- usg_20w-vpn
- usg_flex_700
- usg_flex_100w
- atp100_firmware
- atp700_firmware
- usg_60w
- usg_60_firmware
- vpn300_firmware
- usg20-vpn_firmware
- usg_flex_50_firmware
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')