CVE-2023-6399

MEDIUM

Zyxel ATP-USG FLEX- USG20-W-H <5.37.1 - DoS

Title source: llm
STIX 2.1

Description

A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled.

Scores

CVSS v3 5.7
EPSS 0.0031
EPSS Percentile 53.8%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-134
Status published
Products (33)
zyxel/atp100_firmware 5.37 (2 CPE variants)
zyxel/atp100_firmware 5.10 - 5.37
zyxel/atp100w_firmware 5.37 (2 CPE variants)
zyxel/atp100w_firmware 5.10 - 5.37
zyxel/atp200_firmware 5.37 (2 CPE variants)
zyxel/atp200_firmware 5.10 - 5.37
zyxel/atp500_firmware 5.37 (2 CPE variants)
zyxel/atp500_firmware 5.10 - 5.37
zyxel/atp700_firmware 5.37 (2 CPE variants)
zyxel/atp700_firmware 5.10 - 5.37
... and 23 more
Published Feb 20, 2024
Tracked Since Feb 18, 2026