CVE-2022-43393 (GCVE-0-2022-43393)
Vulnerability from cvelistv5 – Published: 2023-01-11 00:00 – Updated: 2025-04-08 14:29
VLAI?
Summary
An improper check for unusual or exceptional conditions in the HTTP request processing function of Zyxel GS1920-24v2 firmware prior to V4.70(ABMH.8)C0, which could allow an unauthenticated attacker to corrupt the contents of the memory and result in a denial-of-service (DoS) condition on a vulnerable device.
Severity ?
8.2 (High)
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Zyxel | GS1920-24v2 firmware |
Affected:
< V4.70(ABMH.8)C0
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:32:57.958Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-switches"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-43393",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-08T14:29:33.718629Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-08T14:29:52.874Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "GS1920-24v2 firmware",
"vendor": "Zyxel",
"versions": [
{
"status": "affected",
"version": "\u003c V4.70(ABMH.8)C0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An improper check for unusual or exceptional conditions in the HTTP request processing function of Zyxel GS1920-24v2 firmware prior to V4.70(ABMH.8)C0, which could allow an unauthenticated attacker to corrupt the contents of the memory and result in a denial-of-service (DoS) condition on a vulnerable device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754: Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-11T00:00:00.000Z",
"orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f",
"shortName": "Zyxel"
},
"references": [
{
"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-switches"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f",
"assignerShortName": "Zyxel",
"cveId": "CVE-2022-43393",
"datePublished": "2023-01-11T00:00:00.000Z",
"dateReserved": "2022-10-18T00:00:00.000Z",
"dateUpdated": "2025-04-08T14:29:52.874Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-43393",
"date": "2026-04-26",
"epss": "0.01347",
"percentile": "0.80144"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1350-6hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abpi.5\\\\)c0\", \"matchCriteriaId\": \"D18A7C79-0315-42C5-BDFD-7BD71C901D68\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1350-6hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73109E0D-A678-4B48-97DB-1535F98E6A0F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1350-12hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abpj.5\\\\)c0\", \"matchCriteriaId\": \"EDD2F94D-CB97-4053-862E-AE2195B72626\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1350-12hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78519A94-9B7A-4DE9-8A7A-AB03BC1F7064\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1350-18hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abpk.5\\\\)c0\", \"matchCriteriaId\": \"95B3F318-3E79-4713-B92E-32FDA6834F39\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1350-18hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB714940-7B5D-4B9A-8194-187298B50EB4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1350-26hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abpl.5\\\\)c0\", \"matchCriteriaId\": \"11B9BD9E-DC41-400E-B485-BE72D610C0C1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1350-26hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F0CCD53-9367-4BD9-9889-ED9CA2071109\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1915-8_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(acap.3\\\\)c0\", \"matchCriteriaId\": \"C3D21137-BF83-4B7E-A774-2EA3656D3FD5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1915-8:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C166DC2-66D6-4ACF-B4ED-758EA254DA08\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1915-8ep_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(acaq.3\\\\)c0\", \"matchCriteriaId\": \"F44526CA-A0B4-4D14-8F8B-7B95A0A714A2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1915-8ep:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B06CB9E6-849C-4420-89B2-9D76E25787C1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1915-24e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(acdr.3\\\\)c0\", \"matchCriteriaId\": \"7F253392-50F1-4376-B8A2-3500C16D71FB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1915-24e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35A9E7B0-9F01-467F-A80C-DA93EAD684FC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1915-24ep_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(acds.3\\\\)c0\", \"matchCriteriaId\": \"8D6974CD-B468-4C9A-AB6F-B92A2F590D80\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1915-24ep:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"390B8B89-1BF6-41F8-8ADD-AEFAE39CAEA4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1920-24v2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abmh.8\\\\)c0\", \"matchCriteriaId\": \"AF82AA2F-0948-43A9-8D28-6B9EE38AF19B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1920-24v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9EDB58D-2D53-41C6-BA3D-4A5572ED70E6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1920-48v2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abmj.8\\\\)c0\", \"matchCriteriaId\": \"A8F755BB-0297-49CD-8DFD-5BE77BBAFD01\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1920-48v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"983C37B6-DFB3-4F50-B69B-D4175F2211B8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1920-24hpv2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abmi.8\\\\)c0\", \"matchCriteriaId\": \"8A392CF9-047E-428A-A895-B4C461515BC2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1920-24hpv2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B44E7250-5C35-43AA-9862-91DFF76F48D6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1920-48hpv2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abmk.8\\\\)c0\", \"matchCriteriaId\": \"951E92EE-9AD8-44CA-87A6-7AC5169EC002\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs1920-48hpv2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F974A229-75DA-4D99-A041-36C81704535C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs2220-10_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abro.6\\\\)c0\", \"matchCriteriaId\": \"D02E4BCE-69A2-4601-AE91-A525451C98FE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs2220-10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA973FA6-8BC6-473B-9C50-6ECCA5CA06B1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs2220-28_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abrq.6\\\\)c0\", \"matchCriteriaId\": \"6112F13D-45A6-40B6-B63E-392410651588\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs2220-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F691307-4B99-4252-8917-3B0FF24AD8C5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs2220-50_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abrs.6\\\\)c0\", \"matchCriteriaId\": \"849D482E-E5E0-4C8C-9AEF-6C1415C2B710\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs2220-50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35C3C257-9A72-4C6C-86A9-13FA67C5AD84\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs2220-10hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abrp.6\\\\)c0\", \"matchCriteriaId\": \"498C5B4A-D720-48FA-9788-661C00637A37\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs2220-10hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40FBC31D-A1F4-41D0-8A25-39F6CE9B6AEA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs2220-28hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abrr.6\\\\)c0\", \"matchCriteriaId\": \"CC5D2F52-2218-460D-8179-322278A4AB33\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs2220-28hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FB85AF5-6E5C-4ACA-A4E4-35789A665CA4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs2220-50hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abrt.6\\\\)c0\", \"matchCriteriaId\": \"513C8A3C-CD8C-403A-9AB1-8540EA730224\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:gs2220-50hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBCC5F65-B28A-4426-ADDA-5533EA345D09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs1930-28_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abht.5\\\\)c0\", \"matchCriteriaId\": \"C6FE0901-A18E-4EBE-AB78-17D2870B8B53\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs1930-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"527BF823-7CFE-4C7F-AFF1-6BF599454C2B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs1930-28hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abhs.5\\\\)c0\", \"matchCriteriaId\": \"E9EE0F43-452F-4A22-9EC5-763CA9252FF4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs1930-28hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4640BB7E-506B-422E-BCD2-781F6832313A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs1930-52_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abhu.5\\\\)c0\", \"matchCriteriaId\": \"BF4D6810-24F9-40F1-B5AC-6AE1F5B24C30\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs1930-52:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8261CED2-7803-49F7-89F9-EC88B76FCDC7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs1930-52hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abhv.5\\\\)c0\", \"matchCriteriaId\": \"E3C4C081-FCD9-4BEA-8E6E-6FD2E080C21A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs1930-52hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B2595C9-7B7A-48D2-A39B-50621B7A099C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xs1930-10_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(abqe.0\\\\)c0\", \"matchCriteriaId\": \"94FD05D0-96D2-431E-8857-15717340690E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xs1930-10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F675B520-4F05-41D6-ADDF-C26A9C427A55\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xs1930-12hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(abqf.0\\\\)c0\", \"matchCriteriaId\": \"1E7EFB5A-5808-40E3-9EB6-92C9E0D02904\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xs1930-12hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E2171AB-AE63-45F6-9B22-2F93C105B18D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xs1930-12f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(abzv.0\\\\)c0\", \"matchCriteriaId\": \"4E39A41C-9C35-4B51-B41F-14288965E74A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xs1930-12f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB74204B-D5FB-44C6-A59C-8133ECE9CD75\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2210-28_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(aazj.2\\\\)c0\", \"matchCriteriaId\": \"2A1D0176-751A-4152-9E4A-6864288A46E2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2210-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDC9285C-ABA9-4143-B36B-D7A3FE01CDA5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2210-52_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(aazk.2\\\\)c0\", \"matchCriteriaId\": \"B6D80C3E-123B-47FC-88BA-69051CECB2A5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2210-52:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2ECA9AE-19DC-4143-B766-14CD323D44DC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2210-28hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(aazl.2\\\\)c0\", \"matchCriteriaId\": \"F02D6D92-565B-4482-A464-D76F2D2CD96C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2210-28hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D17CD7B-218E-4D8D-BF15-733912C68396\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2210-52hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(aazm.2\\\\)c0\", \"matchCriteriaId\": \"2697EE4A-5F5E-457E-BCAF-30CBAB9816BD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2210-52hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC2DDE21-3A6A-4E9F-A201-3F544A4BD31B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2220-30_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(abxn.1\\\\)c0\", \"matchCriteriaId\": \"1F62FF36-71A2-4FFA-82D1-79AAB8A4BC7A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2220-30:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4F2BEA8-4817-4E14-B5B1-901671AD5E67\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2220-30hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(abxo.1\\\\)c0\", \"matchCriteriaId\": \"8CDC6732-42E7-4F6B-B742-5B8C9C8A0893\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2220-30hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ACCEDBD-3152-4549-9F80-C12715A51BE3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2220-30f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(abye.1\\\\)c0\", \"matchCriteriaId\": \"04DC65D4-0F1C-4845-A752-AA79F986C5BC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2220-30f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A53E4C3-77BD-4646-8B78-9E3A77585779\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2220-54_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(abxp.1\\\\)c0\", \"matchCriteriaId\": \"5BCA10BB-130C-4641-BC50-19E00BF73929\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2220-54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51B14340-165C-407D-B609-B17C44A90D4F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2220-54hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(abxq.1\\\\)c0\", \"matchCriteriaId\": \"B908638A-C6CD-4084-8FAE-1A48A7EA9944\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2220-54hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF030C04-7B74-4B23-8CE9-2D78403B188E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs2220-54fp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(acce.1\\\\)c0\", \"matchCriteriaId\": \"7C74EEED-3873-48B4-BEC7-2C69723F4104\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs2220-54fp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E578CCE-7347-4A9D-A8F2-ADEF6B37BDA2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs4600-32_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abbh.4\\\\)c0\", \"matchCriteriaId\": \"17B653CE-2E5A-4FC3-90A7-1CAB8BA3F94B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs4600-32:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1D4F0FC-CBAD-4F8C-95B2-30B89D810E14\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs4600-32f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abbi.4\\\\)c0\", \"matchCriteriaId\": \"04E5E34A-0E75-4155-92A7-23A57F8D9E3D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs4600-32f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63D66B4D-DD7A-422B-8241-579CA2F4754E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xgs4600-52f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.70\\\\(abik.4\\\\)c0\", \"matchCriteriaId\": \"39A4691B-A8C6-4EAD-B24E-8FCC77C0EB0B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xgs4600-52f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF042B04-8077-481B-B575-BFAF43035747\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xmg1930-30_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(acar.0\\\\)\", \"matchCriteriaId\": \"4BD7AEBD-7811-4755-B5CF-C4AF5EC56296\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xmg1930-30:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58D71444-A727-4B2A-AB17-3BC790829072\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xmg1930-30hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.80\\\\(acas.0\\\\)\", \"matchCriteriaId\": \"4728DB84-BFDF-485C-8190-A1BDB4B25816\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xmg1930-30hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42C2DF2C-0060-45A3-99A3-0B5A37CCC241\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:xs3800-28_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.80\\\\(abml.1\\\\)c0\", \"matchCriteriaId\": \"88E48A15-360A-4C90-B2BF-721989E1D45A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:xs3800-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F275968-2445-4815-A034-5D066FC8C770\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:mgs3500-24s_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.10\\\\(abbr.2\\\\)c0\", \"matchCriteriaId\": \"137C726E-8DD2-44D1-8EDC-C3F974C02B83\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:mgs3500-24s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF58AA72-BAE9-49BF-B462-33D4A84D5D75\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:mgs3520-28_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.10\\\\(aatn.5\\\\)c0\", \"matchCriteriaId\": \"4F6634D4-3BEA-4810-889B-278C48688DD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:mgs3520-28_firmware:4.10\\\\(abqm.1\\\\)c0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A8198C8-3B03-4C41-9823-A5FA85BB17A9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:mgs3520-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6D63E2C-E400-491C-95C2-225DD2285BAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:mgs3520-28f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.10\\\\(aatm.4\\\\)c0\", \"matchCriteriaId\": \"D021F4F2-5CF1-4ACB-92A1-86284A34B995\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:mgs3520-28f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1F9D60-FD74-4ECD-AC22-A8DFAB12FCAE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:mgs3530-28_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.10\\\\(acem.2\\\\)c0\", \"matchCriteriaId\": \"9216AED3-3402-4542-B3AE-72B6B299C712\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:mgs3530-28_firmware:4.10\\\\(acfj.0\\\\)c0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAF5594A-D121-4A1B-B1F8-C126A9C7A33B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:mgs3530-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E0B0DC7-353B-40CC-99F9-10E3258B68AF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An improper check for unusual or exceptional conditions in the HTTP request processing function of Zyxel GS1920-24v2 firmware prior to V4.70(ABMH.8)C0, which could allow an unauthenticated attacker to corrupt the contents of the memory and result in a denial-of-service (DoS) condition on a vulnerable device.\"}, {\"lang\": \"es\", \"value\": \"Una verificaci\\u00f3n inadecuada de condiciones inusuales o excepcionales en la funci\\u00f3n de procesamiento de solicitudes HTTP del firmware Zyxel GS1920-24v2 anterior a V4.70(ABMH.8)C0, que podr\\u00eda permitir que un atacante no autenticado corrompa el contenido de la memoria y resulte en una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS) en un dispositivo vulnerable.\"}]",
"id": "CVE-2022-43393",
"lastModified": "2024-11-21T07:26:23.700",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@zyxel.com.tw\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.2}]}",
"published": "2023-01-11T02:15:11.403",
"references": "[{\"url\": \"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-switches\", \"source\": \"security@zyxel.com.tw\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-switches\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@zyxel.com.tw",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security@zyxel.com.tw\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-754\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-754\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-43393\",\"sourceIdentifier\":\"security@zyxel.com.tw\",\"published\":\"2023-01-11T02:15:11.403\",\"lastModified\":\"2024-11-21T07:26:23.700\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An improper check for unusual or exceptional conditions in the HTTP request processing function of Zyxel GS1920-24v2 firmware prior to V4.70(ABMH.8)C0, which could allow an unauthenticated attacker to corrupt the contents of the memory and result in a denial-of-service (DoS) condition on a vulnerable device.\"},{\"lang\":\"es\",\"value\":\"Una verificaci\u00f3n inadecuada de condiciones inusuales o excepcionales en la funci\u00f3n de procesamiento de solicitudes HTTP del firmware Zyxel GS1920-24v2 anterior a V4.70(ABMH.8)C0, que podr\u00eda permitir que un atacante no autenticado corrompa el contenido de la memoria y resulte en una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo vulnerable.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1350-6hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abpi.5\\\\)c0\",\"matchCriteriaId\":\"D18A7C79-0315-42C5-BDFD-7BD71C901D68\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1350-6hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73109E0D-A678-4B48-97DB-1535F98E6A0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1350-12hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abpj.5\\\\)c0\",\"matchCriteriaId\":\"EDD2F94D-CB97-4053-862E-AE2195B72626\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1350-12hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78519A94-9B7A-4DE9-8A7A-AB03BC1F7064\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1350-18hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abpk.5\\\\)c0\",\"matchCriteriaId\":\"95B3F318-3E79-4713-B92E-32FDA6834F39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1350-18hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB714940-7B5D-4B9A-8194-187298B50EB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1350-26hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abpl.5\\\\)c0\",\"matchCriteriaId\":\"11B9BD9E-DC41-400E-B485-BE72D610C0C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1350-26hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F0CCD53-9367-4BD9-9889-ED9CA2071109\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1915-8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(acap.3\\\\)c0\",\"matchCriteriaId\":\"C3D21137-BF83-4B7E-A774-2EA3656D3FD5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1915-8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C166DC2-66D6-4ACF-B4ED-758EA254DA08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1915-8ep_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(acaq.3\\\\)c0\",\"matchCriteriaId\":\"F44526CA-A0B4-4D14-8F8B-7B95A0A714A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1915-8ep:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06CB9E6-849C-4420-89B2-9D76E25787C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1915-24e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(acdr.3\\\\)c0\",\"matchCriteriaId\":\"7F253392-50F1-4376-B8A2-3500C16D71FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1915-24e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A9E7B0-9F01-467F-A80C-DA93EAD684FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1915-24ep_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(acds.3\\\\)c0\",\"matchCriteriaId\":\"8D6974CD-B468-4C9A-AB6F-B92A2F590D80\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1915-24ep:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"390B8B89-1BF6-41F8-8ADD-AEFAE39CAEA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1920-24v2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abmh.8\\\\)c0\",\"matchCriteriaId\":\"AF82AA2F-0948-43A9-8D28-6B9EE38AF19B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1920-24v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9EDB58D-2D53-41C6-BA3D-4A5572ED70E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1920-48v2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abmj.8\\\\)c0\",\"matchCriteriaId\":\"A8F755BB-0297-49CD-8DFD-5BE77BBAFD01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1920-48v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983C37B6-DFB3-4F50-B69B-D4175F2211B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1920-24hpv2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abmi.8\\\\)c0\",\"matchCriteriaId\":\"8A392CF9-047E-428A-A895-B4C461515BC2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1920-24hpv2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44E7250-5C35-43AA-9862-91DFF76F48D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1920-48hpv2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abmk.8\\\\)c0\",\"matchCriteriaId\":\"951E92EE-9AD8-44CA-87A6-7AC5169EC002\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs1920-48hpv2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F974A229-75DA-4D99-A041-36C81704535C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs2220-10_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abro.6\\\\)c0\",\"matchCriteriaId\":\"D02E4BCE-69A2-4601-AE91-A525451C98FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs2220-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA973FA6-8BC6-473B-9C50-6ECCA5CA06B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs2220-28_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abrq.6\\\\)c0\",\"matchCriteriaId\":\"6112F13D-45A6-40B6-B63E-392410651588\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs2220-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F691307-4B99-4252-8917-3B0FF24AD8C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs2220-50_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abrs.6\\\\)c0\",\"matchCriteriaId\":\"849D482E-E5E0-4C8C-9AEF-6C1415C2B710\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs2220-50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35C3C257-9A72-4C6C-86A9-13FA67C5AD84\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs2220-10hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abrp.6\\\\)c0\",\"matchCriteriaId\":\"498C5B4A-D720-48FA-9788-661C00637A37\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs2220-10hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40FBC31D-A1F4-41D0-8A25-39F6CE9B6AEA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs2220-28hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abrr.6\\\\)c0\",\"matchCriteriaId\":\"CC5D2F52-2218-460D-8179-322278A4AB33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs2220-28hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB85AF5-6E5C-4ACA-A4E4-35789A665CA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs2220-50hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abrt.6\\\\)c0\",\"matchCriteriaId\":\"513C8A3C-CD8C-403A-9AB1-8540EA730224\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:gs2220-50hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCC5F65-B28A-4426-ADDA-5533EA345D09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs1930-28_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abht.5\\\\)c0\",\"matchCriteriaId\":\"C6FE0901-A18E-4EBE-AB78-17D2870B8B53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs1930-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"527BF823-7CFE-4C7F-AFF1-6BF599454C2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs1930-28hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abhs.5\\\\)c0\",\"matchCriteriaId\":\"E9EE0F43-452F-4A22-9EC5-763CA9252FF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs1930-28hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4640BB7E-506B-422E-BCD2-781F6832313A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs1930-52_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abhu.5\\\\)c0\",\"matchCriteriaId\":\"BF4D6810-24F9-40F1-B5AC-6AE1F5B24C30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs1930-52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8261CED2-7803-49F7-89F9-EC88B76FCDC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs1930-52hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abhv.5\\\\)c0\",\"matchCriteriaId\":\"E3C4C081-FCD9-4BEA-8E6E-6FD2E080C21A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs1930-52hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B2595C9-7B7A-48D2-A39B-50621B7A099C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xs1930-10_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(abqe.0\\\\)c0\",\"matchCriteriaId\":\"94FD05D0-96D2-431E-8857-15717340690E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xs1930-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F675B520-4F05-41D6-ADDF-C26A9C427A55\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xs1930-12hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(abqf.0\\\\)c0\",\"matchCriteriaId\":\"1E7EFB5A-5808-40E3-9EB6-92C9E0D02904\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xs1930-12hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2171AB-AE63-45F6-9B22-2F93C105B18D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xs1930-12f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(abzv.0\\\\)c0\",\"matchCriteriaId\":\"4E39A41C-9C35-4B51-B41F-14288965E74A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xs1930-12f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB74204B-D5FB-44C6-A59C-8133ECE9CD75\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2210-28_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(aazj.2\\\\)c0\",\"matchCriteriaId\":\"2A1D0176-751A-4152-9E4A-6864288A46E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2210-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC9285C-ABA9-4143-B36B-D7A3FE01CDA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2210-52_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(aazk.2\\\\)c0\",\"matchCriteriaId\":\"B6D80C3E-123B-47FC-88BA-69051CECB2A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2210-52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2ECA9AE-19DC-4143-B766-14CD323D44DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2210-28hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(aazl.2\\\\)c0\",\"matchCriteriaId\":\"F02D6D92-565B-4482-A464-D76F2D2CD96C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2210-28hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D17CD7B-218E-4D8D-BF15-733912C68396\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2210-52hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(aazm.2\\\\)c0\",\"matchCriteriaId\":\"2697EE4A-5F5E-457E-BCAF-30CBAB9816BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2210-52hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC2DDE21-3A6A-4E9F-A201-3F544A4BD31B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2220-30_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(abxn.1\\\\)c0\",\"matchCriteriaId\":\"1F62FF36-71A2-4FFA-82D1-79AAB8A4BC7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2220-30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F2BEA8-4817-4E14-B5B1-901671AD5E67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2220-30hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(abxo.1\\\\)c0\",\"matchCriteriaId\":\"8CDC6732-42E7-4F6B-B742-5B8C9C8A0893\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2220-30hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ACCEDBD-3152-4549-9F80-C12715A51BE3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2220-30f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(abye.1\\\\)c0\",\"matchCriteriaId\":\"04DC65D4-0F1C-4845-A752-AA79F986C5BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2220-30f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A53E4C3-77BD-4646-8B78-9E3A77585779\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2220-54_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(abxp.1\\\\)c0\",\"matchCriteriaId\":\"5BCA10BB-130C-4641-BC50-19E00BF73929\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2220-54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51B14340-165C-407D-B609-B17C44A90D4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2220-54hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(abxq.1\\\\)c0\",\"matchCriteriaId\":\"B908638A-C6CD-4084-8FAE-1A48A7EA9944\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2220-54hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF030C04-7B74-4B23-8CE9-2D78403B188E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs2220-54fp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(acce.1\\\\)c0\",\"matchCriteriaId\":\"7C74EEED-3873-48B4-BEC7-2C69723F4104\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs2220-54fp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E578CCE-7347-4A9D-A8F2-ADEF6B37BDA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs4600-32_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abbh.4\\\\)c0\",\"matchCriteriaId\":\"17B653CE-2E5A-4FC3-90A7-1CAB8BA3F94B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs4600-32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D4F0FC-CBAD-4F8C-95B2-30B89D810E14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs4600-32f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abbi.4\\\\)c0\",\"matchCriteriaId\":\"04E5E34A-0E75-4155-92A7-23A57F8D9E3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs4600-32f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D66B4D-DD7A-422B-8241-579CA2F4754E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xgs4600-52f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.70\\\\(abik.4\\\\)c0\",\"matchCriteriaId\":\"39A4691B-A8C6-4EAD-B24E-8FCC77C0EB0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xgs4600-52f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF042B04-8077-481B-B575-BFAF43035747\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xmg1930-30_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(acar.0\\\\)\",\"matchCriteriaId\":\"4BD7AEBD-7811-4755-B5CF-C4AF5EC56296\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xmg1930-30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58D71444-A727-4B2A-AB17-3BC790829072\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xmg1930-30hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.80\\\\(acas.0\\\\)\",\"matchCriteriaId\":\"4728DB84-BFDF-485C-8190-A1BDB4B25816\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xmg1930-30hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42C2DF2C-0060-45A3-99A3-0B5A37CCC241\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:xs3800-28_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.80\\\\(abml.1\\\\)c0\",\"matchCriteriaId\":\"88E48A15-360A-4C90-B2BF-721989E1D45A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:xs3800-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F275968-2445-4815-A034-5D066FC8C770\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:mgs3500-24s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.10\\\\(abbr.2\\\\)c0\",\"matchCriteriaId\":\"137C726E-8DD2-44D1-8EDC-C3F974C02B83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:mgs3500-24s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF58AA72-BAE9-49BF-B462-33D4A84D5D75\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:mgs3520-28_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.10\\\\(aatn.5\\\\)c0\",\"matchCriteriaId\":\"4F6634D4-3BEA-4810-889B-278C48688DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:mgs3520-28_firmware:4.10\\\\(abqm.1\\\\)c0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A8198C8-3B03-4C41-9823-A5FA85BB17A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:mgs3520-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D63E2C-E400-491C-95C2-225DD2285BAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:mgs3520-28f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.10\\\\(aatm.4\\\\)c0\",\"matchCriteriaId\":\"D021F4F2-5CF1-4ACB-92A1-86284A34B995\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:mgs3520-28f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1F9D60-FD74-4ECD-AC22-A8DFAB12FCAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:mgs3530-28_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.10\\\\(acem.2\\\\)c0\",\"matchCriteriaId\":\"9216AED3-3402-4542-B3AE-72B6B299C712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:mgs3530-28_firmware:4.10\\\\(acfj.0\\\\)c0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF5594A-D121-4A1B-B1F8-C126A9C7A33B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:mgs3530-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E0B0DC7-353B-40CC-99F9-10E3258B68AF\"}]}]}],\"references\":[{\"url\":\"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-switches\",\"source\":\"security@zyxel.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-switches\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-switches\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:32:57.958Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43393\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-08T14:29:33.718629Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-08T14:29:42.841Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Zyxel\", \"product\": \"GS1920-24v2 firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c V4.70(ABMH.8)C0\"}]}], \"references\": [{\"url\": \"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-switches\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An improper check for unusual or exceptional conditions in the HTTP request processing function of Zyxel GS1920-24v2 firmware prior to V4.70(ABMH.8)C0, which could allow an unauthenticated attacker to corrupt the contents of the memory and result in a denial-of-service (DoS) condition on a vulnerable device.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-754\", \"description\": \"CWE-754: Improper Check for Unusual or Exceptional Conditions\"}]}], \"providerMetadata\": {\"orgId\": \"96e50032-ad0d-4058-a115-4d2c13821f9f\", \"shortName\": \"Zyxel\", \"dateUpdated\": \"2023-01-11T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-43393\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-08T14:29:52.874Z\", \"dateReserved\": \"2022-10-18T00:00:00.000Z\", \"assignerOrgId\": \"96e50032-ad0d-4058-a115-4d2c13821f9f\", \"datePublished\": \"2023-01-11T00:00:00.000Z\", \"assignerShortName\": \"Zyxel\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…