cve-2021-35029
Vulnerability from cvelistv5
Published
2021-07-02 10:29
Modified
2024-08-04 00:33
Severity ?
EPSS score ?
Summary
An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:49.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "USG/Zywall series Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.35 through 4.64" } ] }, { "product": "USG FLEX series Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.35 through 5.01" } ] }, { "product": "ATP series Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.35 through 5.01" } ] }, { "product": "VPN series Firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.35 through 5.01" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T10:29:07", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zyxel.com.tw", "ID": "CVE-2021-35029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "USG/Zywall series Firmware", "version": { "version_data": [ { "version_value": "4.35 through 4.64" } ] } }, { "product_name": "USG FLEX series Firmware", "version": { "version_data": [ { "version_value": "4.35 through 5.01" } ] } }, { "product_name": "ATP series Firmware", "version": { "version_data": [ { "version_value": "4.35 through 5.01" } ] } }, { "product_name": "VPN series Firmware", "version": { "version_data": [ { "version_value": "4.35 through 5.01" } ] } } ] }, "vendor_name": "Zyxel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device." } ] }, "impact": { "cvss": { "baseScore": "9.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml", "refsource": "MISC", "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2021-35029", "datePublished": "2021-07-02T10:29:07", "dateReserved": "2021-06-17T00:00:00", "dateUpdated": "2024-08-04T00:33:49.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-35029\",\"sourceIdentifier\":\"security@zyxel.com.tw\",\"published\":\"2021-07-02T11:15:08.930\",\"lastModified\":\"2021-07-08T18:20:48.127\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de omisi\u00f3n de la autenticaci\u00f3n en la interfaz de administraci\u00f3n basada en web de Zyxel USG/Zywall series versiones de firmware 4.35 hasta 4.64 y USG Flex, ATP, y VPN versiones de firmware 4.35 hasta 5.01, que podr\u00eda permitir a un atacante remoto ejecutar comandos arbitrarios en un dispositivo afectado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]},{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg1900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F4E816-C4D3-451A-965C-45387D7DEB5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg1900_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"0AB64698-F450-405C-9D27-EE5A34466835\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B68C4BD-3279-47AB-AC2A-7555163B12E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg1100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"37AB8F08-EEEB-4318-8A5F-10211B61E852\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F302801D-3720-4598-8458-A8938BD6CB46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg310_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"C3ED3A6D-68BC-48F6-AC34-99C5C012AF85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFF1122-755A-4531-AA2E-FD6E8478F92F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg210_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"D5C0676F-CA90-4E29-8131-AD2026E8E79D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4834AC5E-884D-4A1C-A39B-B3F4A281E3CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg110_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"4F17EF47-19AE-40BC-B547-B5900CC6D627\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CCD2777-CC85-4BAA-B16B-19C2DB8DB742\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg40_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"9DED36D6-2286-4CDF-BACF-48403F3FCCE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0906F3FA-793B-421D-B957-7E9C18C1AEC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg40w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"1E355564-3F7A-4EE4-AD65-A84B78BB5395\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26900300-1325-4C8A-BC3B-A10233B2462A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg60_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"23F9913B-2AE5-4B07-9EED-5A5F18B3F541\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg60w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"2D485C08-FC2E-4569-BB49-249F7BDA149C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A7555E-BC29-460C-A701-7DCDEAFE67F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg300_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"6AB1AAB7-AACC-4535-8C30-2D1FF7B2D647\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3082ED-A564-494D-8427-B61F15F6DD88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg1000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"9755AA21-D626-453A-A7E1-0069832E861A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6626D8CA-2E58-46F7-9592-4922A3E6DF79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg2000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"C6EDA25D-48DE-4B4A-9792-D9587A6FB8FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"748C9FE8-E66D-480F-9688-75E563332A23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"8AC24EC0-FA7F-4500-A9CB-4854286DD67D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F5C3A2C-12EA-4FAE-B088-665A90494685\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"01B72080-1F0E-484D-8929-67BC2585E62B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44BD562-5D3A-4E4F-B648-6E2D1F0B02C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg50_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"ABDA4AA0-FE83-400C-A7AE-001611225552\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE138A97-1AB8-493D-92AA-276DFA40E14F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"6EAAF268-7195-4884-B90E-93054A8CAC95\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D8467-02C4-43F6-A64B-998300D71814\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"4.64\",\"matchCriteriaId\":\"CF8B5062-6330-4369-9D7F-EA54E6A990E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F7F15F3-9A55-462F-8AE3-EE71B759DE68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"6718F421-40F9-4599-9720-9F3461AD0693\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B30A4C0-9928-46AD-9210-C25656FB43FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"AE8626E7-8B32-4F54-9078-2C7E182783F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F93B6A06-2951-46D2-A7E1-103D7318D612\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"0D39FB8E-FF0D-40D2-A92D-FB1B2C89D29D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C697A5-D1D3-4FF0-9C43-D27B18181958\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"686F56DF-BE47-4A17-A275-F7F0F38A16CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D74ABA7E-AA78-4A13-A64E-C44021591B42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"789C6F4B-1592-40C2-9DE1-1C436F6F2A2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D1396E3-731B-4D05-A3F8-F3ABB80D5C29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"5B332B58-AF42-45E3-B224-9AD745485A14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A899D2DE-8C74-4EA1-BD87-B8BF37CBFB6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp100w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"A33C164A-F565-47AB-8F8C-3D418F36638B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp100w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F65954-FF1A-46A4-A003-FF8B9666880A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"817D54B2-A13E-4105-B63D-A0474BC63CD7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4F6D0AA-CDD4-4F1C-98F1-1B381023B3F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"EF1F9383-C537-4B57-B3B1-61F5E7165642\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA85BCA2-CEF5-44EF-BEFB-5DA2638F5F37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"B9AF0390-357C-4249-A7CF-EE902836A2FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50CC94B-4EAA-44A7-AEF1-415491572FB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_atp800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"FECB2D46-3776-4059-8F01-164641965C84\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_atp800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EC7EB91-65C4-45EA-9CB4-3B3961724DCB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_vpn50_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"7EA23975-C587-4BC1-986A-55DA451A05CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_vpn50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D902D9D2-5215-4A70-9D16-F1C3BA10EE18\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_vpn100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"24FD0B6C-EA3E-4AAC-BCFD-A58F0996988E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_vpn100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6762B13C-6FD5-49D7-B2D6-4986BAC3D425\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_vpn300_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"FC931102-95D8-4BF4-AA6B-F8F6CC4024C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_vpn300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C35A94-304B-46FB-BAA0-4E0C4F34BEDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"05F5F64E-3020-4453-A183-454EF80025A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7239C54F-EC9E-44B4-AE33-1D36E5448219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"4ECA11E7-4DCE-4030-9602-F7336A434817\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06D2AD3A-9197-487D-A267-24DE332CC66B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg2200-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"F0ED8D58-62BA-4225-8C68-0E8D75FB936C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg2200-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CB2401-479A-4124-B03F-589D7C1061FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_110_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"2E4763C9-EC74-4CAE-8A72-162E51ABBA9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"145E41D9-E376-4B8E-A34F-F2C7ECFD649D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_310_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"3D54C6A9-B282-4B5C-BAB0-24FB03415FA4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40C703E-C7C0-4B49-A336-83853D3E8C31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_1100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.35\",\"versionEndIncluding\":\"5.01\",\"matchCriteriaId\":\"B8A67D33-EF8E-4B70-891A-51DD5B4680D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCE32A1C-A730-4893-BCB9-F753F8E65440\"}]}]}],\"references\":[{\"url\":\"https://www.zyxel.com/support/Zyxel_security_advisory_for_attacks_against_security_appliances.shtml\",\"source\":\"security@zyxel.com.tw\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.