CVE-2021-35029
Vulnerability from cvelistv5
Published
2021-07-02 10:29
Modified
2024-08-04 00:33
Severity ?
EPSS score ?
Summary
An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | USG/Zywall series Firmware |
Version: 4.35 through 4.64 |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:49.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "USG/Zywall series Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.35 through 4.64" } ] }, { "product": "USG FLEX series Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.35 through 5.01" } ] }, { "product": "ATP series Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.35 through 5.01" } ] }, { "product": "VPN series Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.35 through 5.01" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T10:29:07", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zyxel.com.tw", "ID": "CVE-2021-35029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "USG/Zywall series Firmware", "version": { "version_data": [ { "version_value": "4.35 through 4.64" } ] } }, { "product_name": "USG FLEX series Firmware", "version": { "version_data": [ { "version_value": "4.35 through 5.01" } ] } }, { "product_name": "ATP series Firmware", "version": { "version_data": [ { "version_value": "4.35 through 5.01" } ] } }, { "product_name": "VPN series Firmware", "version": { "version_data": [ { "version_value": "4.35 through 5.01" } ] } } ] }, "vendor_name": "Zyxel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device." } ] }, "impact": { "cvss": { "baseScore": "9.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml", "refsource": "MISC", "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2021-35029", "datePublished": "2021-07-02T10:29:07", "dateReserved": "2021-06-17T00:00:00", "dateUpdated": "2024-08-04T00:33:49.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg1900_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"0AB64698-F450-405C-9D27-EE5A34466835\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg1900:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60F4E816-C4D3-451A-965C-45387D7DEB5B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg1100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"37AB8F08-EEEB-4318-8A5F-10211B61E852\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg1100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B68C4BD-3279-47AB-AC2A-7555163B12E2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg310_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"C3ED3A6D-68BC-48F6-AC34-99C5C012AF85\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F302801D-3720-4598-8458-A8938BD6CB46\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg210_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"D5C0676F-CA90-4E29-8131-AD2026E8E79D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAFF1122-755A-4531-AA2E-FD6E8478F92F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg110_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"4F17EF47-19AE-40BC-B547-B5900CC6D627\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4834AC5E-884D-4A1C-A39B-B3F4A281E3CB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg40_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"9DED36D6-2286-4CDF-BACF-48403F3FCCE0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CCD2777-CC85-4BAA-B16B-19C2DB8DB742\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg40w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"1E355564-3F7A-4EE4-AD65-A84B78BB5395\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0906F3FA-793B-421D-B957-7E9C18C1AEC0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg60_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"23F9913B-2AE5-4B07-9EED-5A5F18B3F541\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26900300-1325-4C8A-BC3B-A10233B2462A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg60w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"2D485C08-FC2E-4569-BB49-249F7BDA149C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5A7555E-BC29-460C-A701-7DCDEAFE67F3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg300_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"6AB1AAB7-AACC-4535-8C30-2D1FF7B2D647\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC3082ED-A564-494D-8427-B61F15F6DD88\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg1000_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"9755AA21-D626-453A-A7E1-0069832E861A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg1000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6626D8CA-2E58-46F7-9592-4922A3E6DF79\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg2000_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"C6EDA25D-48DE-4B4A-9792-D9587A6FB8FC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg2000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"748C9FE8-E66D-480F-9688-75E563332A23\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg20_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"8AC24EC0-FA7F-4500-A9CB-4854286DD67D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F5C3A2C-12EA-4FAE-B088-665A90494685\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg20w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"01B72080-1F0E-484D-8929-67BC2585E62B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg20w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B44BD562-5D3A-4E4F-B648-6E2D1F0B02C7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg50_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"ABDA4AA0-FE83-400C-A7AE-001611225552\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE138A97-1AB8-493D-92AA-276DFA40E14F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"6EAAF268-7195-4884-B90E-93054A8CAC95\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"656D8467-02C4-43F6-A64B-998300D71814\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg200_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"4.64\", \"matchCriteriaId\": \"CF8B5062-6330-4369-9D7F-EA54E6A990E9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F7F15F3-9A55-462F-8AE3-EE71B759DE68\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"6718F421-40F9-4599-9720-9F3461AD0693\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B30A4C0-9928-46AD-9210-C25656FB43FB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"AE8626E7-8B32-4F54-9078-2C7E182783F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F93B6A06-2951-46D2-A7E1-103D7318D612\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"0D39FB8E-FF0D-40D2-A92D-FB1B2C89D29D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92C697A5-D1D3-4FF0-9C43-D27B18181958\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"686F56DF-BE47-4A17-A275-F7F0F38A16CF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D74ABA7E-AA78-4A13-A64E-C44021591B42\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"789C6F4B-1592-40C2-9DE1-1C436F6F2A2B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D1396E3-731B-4D05-A3F8-F3ABB80D5C29\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_atp100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"5B332B58-AF42-45E3-B224-9AD745485A14\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_atp100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A899D2DE-8C74-4EA1-BD87-B8BF37CBFB6D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_atp100w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"A33C164A-F565-47AB-8F8C-3D418F36638B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_atp100w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7F65954-FF1A-46A4-A003-FF8B9666880A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_atp200_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"817D54B2-A13E-4105-B63D-A0474BC63CD7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_atp200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4F6D0AA-CDD4-4F1C-98F1-1B381023B3F4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_atp500_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"EF1F9383-C537-4B57-B3B1-61F5E7165642\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_atp500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA85BCA2-CEF5-44EF-BEFB-5DA2638F5F37\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_atp700_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"B9AF0390-357C-4249-A7CF-EE902836A2FE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_atp700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D50CC94B-4EAA-44A7-AEF1-415491572FB1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_atp800_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"FECB2D46-3776-4059-8F01-164641965C84\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_atp800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EC7EB91-65C4-45EA-9CB4-3B3961724DCB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_vpn50_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"7EA23975-C587-4BC1-986A-55DA451A05CB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_vpn50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D902D9D2-5215-4A70-9D16-F1C3BA10EE18\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_vpn100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"24FD0B6C-EA3E-4AAC-BCFD-A58F0996988E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_vpn100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6762B13C-6FD5-49D7-B2D6-4986BAC3D425\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_vpn300_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"FC931102-95D8-4BF4-AA6B-F8F6CC4024C7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_vpn300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7C35A94-304B-46FB-BAA0-4E0C4F34BEDD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"05F5F64E-3020-4453-A183-454EF80025A7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7239C54F-EC9E-44B4-AE33-1D36E5448219\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"4ECA11E7-4DCE-4030-9602-F7336A434817\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06D2AD3A-9197-487D-A267-24DE332CC66B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg2200-vpn_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"F0ED8D58-62BA-4225-8C68-0E8D75FB936C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg2200-vpn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68CB2401-479A-4124-B03F-589D7C1061FF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_110_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"2E4763C9-EC74-4CAE-8A72-162E51ABBA9E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"145E41D9-E376-4B8E-A34F-F2C7ECFD649D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_310_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"3D54C6A9-B282-4B5C-BAB0-24FB03415FA4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B40C703E-C7C0-4B49-A336-83853D3E8C31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_1100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.35\", \"versionEndIncluding\": \"5.01\", \"matchCriteriaId\": \"B8A67D33-EF8E-4B70-891A-51DD5B4680D8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCE32A1C-A730-4893-BCB9-F753F8E65440\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de omisi\\u00f3n de la autenticaci\\u00f3n en la interfaz de administraci\\u00f3n basada en web de Zyxel USG/Zywall series versiones de firmware 4.35 hasta 4.64 y USG Flex, ATP, y VPN versiones de firmware 4.35 hasta 5.01, que podr\\u00eda permitir a un atacante remoto ejecutar comandos arbitrarios en un dispositivo afectado\"}]", "id": "CVE-2021-35029", "lastModified": "2024-11-21T06:11:42.280", "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@zyxel.com.tw\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2021-07-02T11:15:08.930", "references": "[{\"url\": \"https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml\", \"source\": \"security@zyxel.com.tw\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"security@zyxel.com.tw\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2021-35029\",\"sourceIdentifier\":\"security@zyxel.com.tw\",\"published\":\"2021-07-02T11:15:08.930\",\"lastModified\":\"2024-11-21T06:11:42.280\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de omisi\u00f3n de la autenticaci\u00f3n en la interfaz de administraci\u00f3n basada en web de Zyxel USG/Zywall series versiones de firmware 4.35 hasta 4.64 y USG Flex, ATP, y VPN versiones de firmware 4.35 hasta 5.01, que podr\u00eda permitir a un atacante remoto ejecutar comandos arbitrarios en un dispositivo afectado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg1900_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"0AB64698-F450-405C-9D27-EE5A34466835\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg1900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F4E816-C4D3-451A-965C-45387D7DEB5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg1100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"37AB8F08-EEEB-4318-8A5F-10211B61E852\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B68C4BD-3279-47AB-AC2A-7555163B12E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg310_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"C3ED3A6D-68BC-48F6-AC34-99C5C012AF85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F302801D-3720-4598-8458-A8938BD6CB46\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg210_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"D5C0676F-CA90-4E29-8131-AD2026E8E79D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFF1122-755A-4531-AA2E-FD6E8478F92F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg110_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"4F17EF47-19AE-40BC-B547-B5900CC6D627\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4834AC5E-884D-4A1C-A39B-B3F4A281E3CB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg40_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"9DED36D6-2286-4CDF-BACF-48403F3FCCE0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CCD2777-CC85-4BAA-B16B-19C2DB8DB742\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg40w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"1E355564-3F7A-4EE4-AD65-A84B78BB5395\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0906F3FA-793B-421D-B957-7E9C18C1AEC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg60_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"23F9913B-2AE5-4B07-9EED-5A5F18B3F541\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26900300-1325-4C8A-BC3B-A10233B2462A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg60w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"2D485C08-FC2E-4569-BB49-249F7BDA149C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A7555E-BC29-460C-A701-7DCDEAFE67F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg300_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"6AB1AAB7-AACC-4535-8C30-2D1FF7B2D647\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3082ED-A564-494D-8427-B61F15F6DD88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg1000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"9755AA21-D626-453A-A7E1-0069832E861A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6626D8CA-2E58-46F7-9592-4922A3E6DF79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg2000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"C6EDA25D-48DE-4B4A-9792-D9587A6FB8FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"748C9FE8-E66D-480F-9688-75E563332A23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"8AC24EC0-FA7F-4500-A9CB-4854286DD67D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F5C3A2C-12EA-4FAE-B088-665A90494685\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"01B72080-1F0E-484D-8929-67BC2585E62B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44BD562-5D3A-4E4F-B648-6E2D1F0B02C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg50_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"ABDA4AA0-FE83-400C-A7AE-001611225552\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE138A97-1AB8-493D-92AA-276DFA40E14F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"6EAAF268-7195-4884-B90E-93054A8CAC95\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D8467-02C4-43F6-A64B-998300D71814\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"CF8B5062-6330-4369-9D7F-EA54E6A990E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F7F15F3-9A55-462F-8AE3-EE71B759DE68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"6718F421-40F9-4599-9720-9F3461AD0693\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B30A4C0-9928-46AD-9210-C25656FB43FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"AE8626E7-8B32-4F54-9078-2C7E182783F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F93B6A06-2951-46D2-A7E1-103D7318D612\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"0D39FB8E-FF0D-40D2-A92D-FB1B2C89D29D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C697A5-D1D3-4FF0-9C43-D27B18181958\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"686F56DF-BE47-4A17-A275-F7F0F38A16CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D74ABA7E-AA78-4A13-A64E-C44021591B42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"789C6F4B-1592-40C2-9DE1-1C436F6F2A2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D1396E3-731B-4D05-A3F8-F3ABB80D5C29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"5B332B58-AF42-45E3-B224-9AD745485A14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A899D2DE-8C74-4EA1-BD87-B8BF37CBFB6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp100w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"A33C164A-F565-47AB-8F8C-3D418F36638B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp100w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F65954-FF1A-46A4-A003-FF8B9666880A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"817D54B2-A13E-4105-B63D-A0474BC63CD7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4F6D0AA-CDD4-4F1C-98F1-1B381023B3F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"EF1F9383-C537-4B57-B3B1-61F5E7165642\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA85BCA2-CEF5-44EF-BEFB-5DA2638F5F37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"B9AF0390-357C-4249-A7CF-EE902836A2FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50CC94B-4EAA-44A7-AEF1-415491572FB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"FECB2D46-3776-4059-8F01-164641965C84\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EC7EB91-65C4-45EA-9CB4-3B3961724DCB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_vpn50_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"7EA23975-C587-4BC1-986A-55DA451A05CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_vpn50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D902D9D2-5215-4A70-9D16-F1C3BA10EE18\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_vpn100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"24FD0B6C-EA3E-4AAC-BCFD-A58F0996988E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_vpn100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6762B13C-6FD5-49D7-B2D6-4986BAC3D425\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_vpn300_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"FC931102-95D8-4BF4-AA6B-F8F6CC4024C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_vpn300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C35A94-304B-46FB-BAA0-4E0C4F34BEDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"05F5F64E-3020-4453-A183-454EF80025A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7239C54F-EC9E-44B4-AE33-1D36E5448219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"4ECA11E7-4DCE-4030-9602-F7336A434817\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06D2AD3A-9197-487D-A267-24DE332CC66B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg2200-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"F0ED8D58-62BA-4225-8C68-0E8D75FB936C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg2200-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CB2401-479A-4124-B03F-589D7C1061FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_110_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"2E4763C9-EC74-4CAE-8A72-162E51ABBA9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"145E41D9-E376-4B8E-A34F-F2C7ECFD649D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_310_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"3D54C6A9-B282-4B5C-BAB0-24FB03415FA4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40C703E-C7C0-4B49-A336-83853D3E8C31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_1100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"B8A67D33-EF8E-4B70-891A-51DD5B4680D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCE32A1C-A730-4893-BCB9-F753F8E65440\"}]}]}],\"references\":[{\"url\":\"https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml\",\"source\":\"security@zyxel.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.