Description
A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled.
Scores
CVSS v3
5.7
EPSS
0.0031
EPSS Percentile
53.8%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-134
Status
published
Products (33)
zyxel/atp100_firmware
5.37 (2 CPE variants)
zyxel/atp100_firmware
5.10 - 5.37
zyxel/atp100w_firmware
5.37 (2 CPE variants)
zyxel/atp100w_firmware
5.10 - 5.37
zyxel/atp200_firmware
5.37 (2 CPE variants)
zyxel/atp200_firmware
5.10 - 5.37
zyxel/atp500_firmware
5.37 (2 CPE variants)
zyxel/atp500_firmware
5.10 - 5.37
zyxel/atp700_firmware
5.37 (2 CPE variants)
zyxel/atp700_firmware
5.10 - 5.37
... and 23 more
Published
Feb 20, 2024
Tracked Since
Feb 18, 2026