cve-2022-38547
Vulnerability from cvelistv5
Published
2023-02-07 00:00
Modified
2024-08-03 10:54
Severity ?
EPSS score ?
Summary
A post-authentication command injection vulnerability in the CLI command of Zyxel ZyWALL/USG series firmware versions 4.20 through 4.72, VPN series firmware versions 4.30 through 5.32, USG FLEX series firmware versions 4.50 through 5.32, and ATP series firmware versions 4.32 through 5.32, which could allow an authenticated attacker with administrator privileges to execute OS commands.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zyxel | ZyWALL/USG series firmware |
Version: 4.20 through 4.72 |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:54:04.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-rce-in-firewalls" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ZyWALL/USG series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.20 through 4.72" } ] }, { "product": "VPN series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.30 through 5.32" } ] }, { "product": "USG FLEX series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.50 through 5.32" } ] }, { "product": "ATP series firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "4.32 through 5.32" } ] } ], "descriptions": [ { "lang": "en", "value": "A post-authentication command injection vulnerability in the CLI command of Zyxel ZyWALL/USG series firmware versions 4.20 through 4.72, VPN series firmware versions 4.30 through 5.32, USG FLEX series firmware versions 4.50 through 5.32, and ATP series firmware versions 4.32 through 5.32, which could allow an authenticated attacker with administrator privileges to execute OS commands." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-07T00:00:00", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-rce-in-firewalls" } ] } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2022-38547", "datePublished": "2023-02-07T00:00:00", "dateReserved": "2022-08-22T00:00:00", "dateUpdated": "2024-08-03T10:54:04.001Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.32\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"C4EE6E9E-25BA-4F9A-B13A-9A4A405E24DC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F7654A1-3806-41C7-82D4-46B0CD7EE53B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.32\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"35945749-7707-4057-A23C-F69615D78C9D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D68A36FF-8CAF-401C-9F18-94F3A2405CF4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.32\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"FA692134-7730-4518-9CB1-BDAE32578EA7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B41F437-855B-4490-8011-DF59887BE6D5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.32\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"9A202967-379D-41C2-AF18-C287CD075677\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2818E8AC-FFEE-4DF9-BF3F-C75166C0E851\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.32\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"467CC4CE-B69F-4341-B35B-293C36BEC8F1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47398FD0-6C5E-4625-9EFD-DE08C9AB7DB2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.32\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"84116343-9050-47AD-8C5D-6C69247BAE98\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66B99746-0589-46E6-9CBD-F38619AD97DC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.50\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"A27B3207-D9E6-418D-AD64-A578E4DE77E6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"646C1F07-B553-47B0-953B-DC7DE7FD0F8B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.50\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"7108742C-1064-4657-9932-87BDBE1E2AC5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F93B6A06-2951-46D2-A7E1-103D7318D612\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.50\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"FDA8914D-F868-4ECC-B110-FCA5C3C9EBA5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92C697A5-D1D3-4FF0-9C43-D27B18181958\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.50\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"55177D6F-BD50-49EE-B8F8-2AFB3D2B0FFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D1396E3-731B-4D05-A3F8-F3ABB80D5C29\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.50\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"7E3ACF88-2143-4D19-8C64-64170DC1771B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D74ABA7E-AA78-4A13-A64E-C44021591B42\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.50\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"C26CCE16-5719-4B2D-AC1D-AD2354A61046\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B30A4C0-9928-46AD-9210-C25656FB43FB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.30\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"879037A2-5CCF-44C5-9B70-DA8E79AD3343\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EECD311A-4E96-4576-AADF-47291EDE3559\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.30\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"DD415B02-D7C2-4C23-B0EF-2E13DFF5CFD1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06D2AD3A-9197-487D-A267-24DE332CC66B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.30\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"F9026D87-7D08-46D7-A9A6-6758FA7A5D0D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7239C54F-EC9E-44B4-AE33-1D36E5448219\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.30\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"1071A736-AE03-4C49-9F19-4E7B77E31C3E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E3AC823-0ECA-42D8-8312-2FBE5914E4C0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.30\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"A625626B-2E60-4D54-A4FC-80B7C59EAC7A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C45C303-1A95-4245-B242-3AB9B9106CD4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.30\", \"versionEndIncluding\": \"5.32\", \"matchCriteriaId\": \"509B75A6-B827-4328-B9F8-C0828279A29E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81D90A7B-174F-40A1-8AF4-08B15B7BAC40\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg40_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndIncluding\": \"4.72\", \"matchCriteriaId\": \"3F486DCF-02EB-49DC-862A-3CE9B55D8210\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CCD2777-CC85-4BAA-B16B-19C2DB8DB742\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg40w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndIncluding\": \"4.72\", \"matchCriteriaId\": \"94A7F2DF-F22C-49DA-9563-BAFD59011B70\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0906F3FA-793B-421D-B957-7E9C18C1AEC0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg60_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndIncluding\": \"4.72\", \"matchCriteriaId\": \"36CDEEE3-8284-4759-9B23-72989BBABBDD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26900300-1325-4C8A-BC3B-A10233B2462A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:usg60w_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndIncluding\": \"4.72\", \"matchCriteriaId\": \"149EABE0-AAB1-41C2-9A34-2C25650B83BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5A7555E-BC29-460C-A701-7DCDEAFE67F3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_110_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndIncluding\": \"4.72\", \"matchCriteriaId\": \"1DFEBB3B-F29D-4EE7-9ECE-F7711783A0EF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"145E41D9-E376-4B8E-A34F-F2C7ECFD649D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_1100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndIncluding\": \"4.72\", \"matchCriteriaId\": \"A8BE4050-32D8-4306-A668-14F3CC8169EC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCE32A1C-A730-4893-BCB9-F753F8E65440\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:zywall_310_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndIncluding\": \"4.72\", \"matchCriteriaId\": \"FBCCCD01-5009-48B3-9484-925D5436C6D9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B40C703E-C7C0-4B49-A336-83853D3E8C31\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"A post-authentication command injection vulnerability in the CLI command of Zyxel ZyWALL/USG series firmware versions 4.20 through 4.72, VPN series firmware versions 4.30 through 5.32, USG FLEX series firmware versions 4.50 through 5.32, and ATP series firmware versions 4.32 through 5.32, which could allow an authenticated attacker with administrator privileges to execute OS commands.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de inyecci\\u00f3n de comando posterior a la autenticaci\\u00f3n en el comando CLI de las versiones de firmware de la serie Zyxel ZyWALL/USG 4.20 a 4.72, las versiones de firmware de la serie VPN 4.30 a 5.32, las versiones de firmware de la serie USG FLEX 4.50 a 5.32 y las versiones de firmware de la serie ATP 4.32 a 5.32, que podr\\u00eda permitir que un atacante autenticado con privilegios de administrador ejecute comandos del sistema operativo.\"}]", "id": "CVE-2022-38547", "lastModified": "2024-11-21T07:16:39.203", "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@zyxel.com.tw\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}]}", "published": "2023-02-07T02:15:07.883", "references": "[{\"url\": \"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-rce-in-firewalls\", \"source\": \"security@zyxel.com.tw\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-rce-in-firewalls\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"security@zyxel.com.tw\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-38547\",\"sourceIdentifier\":\"security@zyxel.com.tw\",\"published\":\"2023-02-07T02:15:07.883\",\"lastModified\":\"2024-11-21T07:16:39.203\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A post-authentication command injection vulnerability in the CLI command of Zyxel ZyWALL/USG series firmware versions 4.20 through 4.72, VPN series firmware versions 4.30 through 5.32, USG FLEX series firmware versions 4.50 through 5.32, and ATP series firmware versions 4.32 through 5.32, which could allow an authenticated attacker with administrator privileges to execute OS commands.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n en el comando CLI de las versiones de firmware de la serie Zyxel ZyWALL/USG 4.20 a 4.72, las versiones de firmware de la serie VPN 4.30 a 5.32, las versiones de firmware de la serie USG FLEX 4.50 a 5.32 y las versiones de firmware de la serie ATP 4.32 a 5.32, que podr\u00eda permitir que un atacante autenticado con privilegios de administrador ejecute comandos del sistema operativo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@zyxel.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"C4EE6E9E-25BA-4F9A-B13A-9A4A405E24DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7654A1-3806-41C7-82D4-46B0CD7EE53B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"35945749-7707-4057-A23C-F69615D78C9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D68A36FF-8CAF-401C-9F18-94F3A2405CF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"FA692134-7730-4518-9CB1-BDAE32578EA7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B41F437-855B-4490-8011-DF59887BE6D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"9A202967-379D-41C2-AF18-C287CD075677\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2818E8AC-FFEE-4DF9-BF3F-C75166C0E851\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"467CC4CE-B69F-4341-B35B-293C36BEC8F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47398FD0-6C5E-4625-9EFD-DE08C9AB7DB2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.32\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"84116343-9050-47AD-8C5D-6C69247BAE98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B99746-0589-46E6-9CBD-F38619AD97DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"A27B3207-D9E6-418D-AD64-A578E4DE77E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"646C1F07-B553-47B0-953B-DC7DE7FD0F8B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"7108742C-1064-4657-9932-87BDBE1E2AC5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F93B6A06-2951-46D2-A7E1-103D7318D612\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"FDA8914D-F868-4ECC-B110-FCA5C3C9EBA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C697A5-D1D3-4FF0-9C43-D27B18181958\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"55177D6F-BD50-49EE-B8F8-2AFB3D2B0FFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D1396E3-731B-4D05-A3F8-F3ABB80D5C29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"7E3ACF88-2143-4D19-8C64-64170DC1771B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D74ABA7E-AA78-4A13-A64E-C44021591B42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.50\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"C26CCE16-5719-4B2D-AC1D-AD2354A61046\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B30A4C0-9928-46AD-9210-C25656FB43FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"879037A2-5CCF-44C5-9B70-DA8E79AD3343\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EECD311A-4E96-4576-AADF-47291EDE3559\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"DD415B02-D7C2-4C23-B0EF-2E13DFF5CFD1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06D2AD3A-9197-487D-A267-24DE332CC66B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"F9026D87-7D08-46D7-A9A6-6758FA7A5D0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7239C54F-EC9E-44B4-AE33-1D36E5448219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"1071A736-AE03-4C49-9F19-4E7B77E31C3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E3AC823-0ECA-42D8-8312-2FBE5914E4C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"A625626B-2E60-4D54-A4FC-80B7C59EAC7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C45C303-1A95-4245-B242-3AB9B9106CD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.30\",\"versionEndIncluding\":\"5.32\",\"matchCriteriaId\":\"509B75A6-B827-4328-B9F8-C0828279A29E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D90A7B-174F-40A1-8AF4-08B15B7BAC40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg40_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndIncluding\":\"4.72\",\"matchCriteriaId\":\"3F486DCF-02EB-49DC-862A-3CE9B55D8210\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CCD2777-CC85-4BAA-B16B-19C2DB8DB742\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg40w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndIncluding\":\"4.72\",\"matchCriteriaId\":\"94A7F2DF-F22C-49DA-9563-BAFD59011B70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0906F3FA-793B-421D-B957-7E9C18C1AEC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg60_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndIncluding\":\"4.72\",\"matchCriteriaId\":\"36CDEEE3-8284-4759-9B23-72989BBABBDD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26900300-1325-4C8A-BC3B-A10233B2462A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:usg60w_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndIncluding\":\"4.72\",\"matchCriteriaId\":\"149EABE0-AAB1-41C2-9A34-2C25650B83BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A7555E-BC29-460C-A701-7DCDEAFE67F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_110_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndIncluding\":\"4.72\",\"matchCriteriaId\":\"1DFEBB3B-F29D-4EE7-9ECE-F7711783A0EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"145E41D9-E376-4B8E-A34F-F2C7ECFD649D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_1100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndIncluding\":\"4.72\",\"matchCriteriaId\":\"A8BE4050-32D8-4306-A668-14F3CC8169EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCE32A1C-A730-4893-BCB9-F753F8E65440\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:zywall_310_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndIncluding\":\"4.72\",\"matchCriteriaId\":\"FBCCCD01-5009-48B3-9484-925D5436C6D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40C703E-C7C0-4B49-A336-83853D3E8C31\"}]}]}],\"references\":[{\"url\":\"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-rce-in-firewalls\",\"source\":\"security@zyxel.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-rce-in-firewalls\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.