CVE-2023-6764

HIGH

Zyxel Atp100 Firmware < 5.37 - Format String Vulnerability

Title source: rule
STIX 2.1

Description

A format string vulnerability in a function of the IPSec VPN feature in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an attacker to achieve unauthorized remote code execution by sending a sequence of specially crafted payloads containing an invalid pointer; however, such an attack would require detailed knowledge of an affected device’s memory layout and configuration.

Scores

CVSS v3 8.1
EPSS 0.0233
EPSS Percentile 84.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-134
Status published
Products (33)
zyxel/atp100_firmware 5.37 (2 CPE variants)
zyxel/atp100_firmware 4.32 - 5.37
zyxel/atp100w_firmware 5.37 (2 CPE variants)
zyxel/atp100w_firmware 4.32 - 5.37
zyxel/atp200_firmware 5.37 (2 CPE variants)
zyxel/atp200_firmware 4.32 - 5.37
zyxel/atp500_firmware 5.37 (2 CPE variants)
zyxel/atp500_firmware 4.32 - 5.37
zyxel/atp700_firmware 5.37 (2 CPE variants)
zyxel/atp700_firmware 4.32 - 5.37
... and 23 more
Published Feb 20, 2024
Tracked Since Feb 18, 2026