FKIE_CVE-2023-6399

Vulnerability from fkie_nvd - Published: 2024-02-20 02:15 - Updated: 2025-01-21 18:36
Summary
A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled.
Impacted products
Vendor Product Version
zyxel atp100_firmware *
zyxel atp100_firmware 5.37
zyxel atp100_firmware 5.37
zyxel atp100 -
zyxel atp100w_firmware *
zyxel atp100w_firmware 5.37
zyxel atp100w_firmware 5.37
zyxel atp100w -
zyxel atp200_firmware *
zyxel atp200_firmware 5.37
zyxel atp200_firmware 5.37
zyxel atp200 -
zyxel atp500_firmware *
zyxel atp500_firmware 5.37
zyxel atp500_firmware 5.37
zyxel atp500 -
zyxel atp700_firmware *
zyxel atp700_firmware 5.37
zyxel atp700_firmware 5.37
zyxel atp700 -
zyxel atp800_firmware *
zyxel atp800_firmware 5.37
zyxel atp800_firmware 5.37
zyxel atp800 -
zyxel usg_flex_100_firmware *
zyxel usg_flex_100_firmware 5.37
zyxel usg_flex_100_firmware 5.37
zyxel usg_flex_100 -
zyxel usg_flex_100ax_firmware *
zyxel usg_flex_100ax_firmware 5.37
zyxel usg_flex_100ax_firmware 5.37
zyxel usg_flex_100ax -
zyxel usg_flex_100h_firmware *
zyxel usg_flex_100h_firmware 5.37
zyxel usg_flex_100h_firmware 5.37
zyxel usg_flex_100h -
zyxel usg_flex_100w_firmware *
zyxel usg_flex_100w_firmware 5.37
zyxel usg_flex_100w_firmware 5.37
zyxel usg_flex_100w -
zyxel usg_flex_200_firmware *
zyxel usg_flex_200_firmware 5.37
zyxel usg_flex_200_firmware 5.37
zyxel usg_flex_200 -
zyxel usg_flex_200h_firmware *
zyxel usg_flex_200h_firmware 5.37
zyxel usg_flex_200h_firmware 5.37
zyxel usg_flex_200h -
zyxel usg_flex_200hp_firmware *
zyxel usg_flex_200hp_firmware 5.37
zyxel usg_flex_200hp_firmware 5.37
zyxel usg_flex_200hp -
zyxel usg_flex_500_firmware *
zyxel usg_flex_500_firmware 5.37
zyxel usg_flex_500_firmware 5.37
zyxel usg_flex_500 -
zyxel usg_flex_500h_firmware *
zyxel usg_flex_500h_firmware 5.37
zyxel usg_flex_500h_firmware 5.37
zyxel usg_flex_500h -
zyxel usg_flex_700_firmware *
zyxel usg_flex_700_firmware 5.37
zyxel usg_flex_700_firmware 5.37
zyxel usg_flex_700 -
zyxel usg_flex_700h_firmware *
zyxel usg_flex_700h_firmware 5.37
zyxel usg_flex_700h_firmware 5.37
zyxel usg_flex_700h -
zyxel usg_flex_50_firmware *
zyxel usg_flex_50_firmware 5.37
zyxel usg_flex_50_firmware 5.37
zyxel usg_flex_50 -
zyxel usg_flex_50w_firmware *
zyxel usg_flex_50w_firmware 5.37
zyxel usg_flex_50w_firmware 5.37
zyxel usg_flex_50w -
zyxel usg20-vpn_firmware *
zyxel usg20-vpn_firmware 5.37
zyxel usg20-vpn_firmware 5.37
zyxel usg20-vpn -
zyxel usg20w-vpn_firmware *
zyxel usg20w-vpn_firmware 5.37
zyxel usg20w-vpn_firmware 5.37
zyxel usg20w-vpn -
zyxel uos 1.10
zyxel uos 1.10
zyxel usg_flex_100h -
zyxel usg_flex_100hp -
zyxel usg_flex_200h -
zyxel usg_flex_200hp -
zyxel usg_flex_500h -
zyxel usg_flex_700h -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A27486-8F61-46B1-AA77-1249E75DD8CC",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp100_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "121E2131-A6CB-4714-BD0B-9CDBFF924F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp100_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "C4AA7A4F-E00F-4CFA-8B4F-305BEC37F0B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F7654A1-3806-41C7-82D4-46B0CD7EE53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "218B2397-5415-4AC0-BFA4-7D24640EF76E",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp100w_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "F750721F-73AD-4BDD-A407-72D8DEB30C68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp100w_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "069E7437-BF71-4F73-8C0A-44DC9804492B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47398FD0-6C5E-4625-9EFD-DE08C9AB7DB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F16582B0-232D-4815-86D5-1CFFFFE5990D",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp200_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "B20F854E-486D-46C0-90C8-81153573FEF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp200_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "DE71538C-16FD-43B1-B6CD-EB5988AFB7BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68A36FF-8CAF-401C-9F18-94F3A2405CF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C968353-8FC1-45B7-A2D0-F6713A3BC760",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp500_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "9E8933B8-F66E-4667-955E-DB5486534C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp500_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "6F694EDC-DEF2-47D4-BCF0-32972EF8CEA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2818E8AC-FFEE-4DF9-BF3F-C75166C0E851",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C951EB-8950-4927-8F99-81EE1B4856F7",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp700_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "0E3E890B-8BDE-4C22-BFF7-B87495C71C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp700_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "3037AE20-8F8B-4656-9534-6436A8AEA8C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B41F437-855B-4490-8011-DF59887BE6D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF54B670-3135-4AF9-B72D-F4D8BEE48878",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp800_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "67FA1CEC-DED7-46D4-A4FC-780431B3EE2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp800_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "DFD1CE91-B72C-4589-9A5F-F1164C0193AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B99746-0589-46E6-9CBD-F38619AD97DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "700227C4-A23F-4CFF-839F-B61A44E0E34E",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "DF266069-4FA5-4343-B62C-0940A0C61566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "99E0ECA5-7FE6-4E56-A741-E3260C99A43A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B30A4C0-9928-46AD-9210-C25656FB43FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF23ACF5-9961-4BA9-84D2-C09EF39790D2",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "395E8D72-E9F6-4923-B4DE-875D195B27F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "FCBEDDCD-A9F6-4E07-ADF8-B1E9C557CDEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03036815-04AE-4E39-8310-DA19A32CFA48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A8EFB09-4987-4CB6-838D-A15D47A2000D",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "45EEA203-C4E3-4916-A9E5-15AB994B53FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A21576D3-6A3F-451C-9B62-E0B0418D5529",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED28D5ED-B21A-4CD6-947E-9C21EA801B7D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F24FD1EE-4527-4A9D-AFF6-086EB5A30347",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "DC61CF4F-74D5-4C96-8D8A-779436CF344D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "25EB6607-7241-4D01-BC87-3C3E62B27B6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74ABA7E-AA78-4A13-A64E-C44021591B42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61F127FD-22D4-48CC-95FC-321722683A6D",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "8E4CC2FF-2BB1-43E8-A7AA-56A220705FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "31206A47-4A01-4FB7-A0AA-E9D22C63941D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F93B6A06-2951-46D2-A7E1-103D7318D612",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8198C3A9-5F65-4FC8-8997-81BEB218FE0D",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "CBDE985D-B016-4303-8EE6-904C79F8FE82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "0ACD16E9-7EE0-4AD5-9D71-121AFAEF7947",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_200h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D15ECD-4942-407A-A62E-9785568C6B78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200hp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91D7A49-19EA-43E6-BA4C-A92814DCE37B",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "9EE95AED-D8FB-44BD-856D-2F7A6DB2AABA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D764B87E-8B23-4C33-93BB-59B23CFEADBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_200hp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7E9028-1ECB-4D88-84D8-CFC589B429AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7494CE3-5299-4B2D-B432-CDAC50D30103",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "D9D7FBB8-C983-4EFA-90CB-EC5C6A26D112",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "5CDA1267-E136-4932-9627-B4D12DB17E27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C697A5-D1D3-4FF0-9C43-D27B18181958",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "135DA0CD-2403-44F0-97CF-290B33B4CFAF",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "1D168F82-50CE-4E25-B1D9-B50F69463F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "9A0B9A2C-772B-4669-BC7C-71FA32B1B4EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE57BCA4-8631-460A-BFE3-BB765E5D009F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D57C8E7-6126-4A9D-A24A-F56719A59E8B",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "A1FEDD30-0B80-4F07-8475-156B9FE46883",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "3953AFFC-18E6-46AA-BC99-EA65726E4D9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D1396E3-731B-4D05-A3F8-F3ABB80D5C29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F9F198-3A49-4BD9-952B-B95E4E3EC19A",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "A5A45A9D-D9C7-495D-BD83-EE088746FD36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "606D09B9-0376-4277-9964-F0580D65C3E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_700h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8832743A-99FA-417E-BCE1-4BF7D4CEF9BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB8F3CE-5EE9-41AD-9CB3-014BE1F51F27",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "5476C178-E553-44FC-854B-5851F0F28469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "C2D65155-CDF2-4A99-94CA-D4B61B26D32C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "646C1F07-B553-47B0-953B-DC7DE7FD0F8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F8F9B1A-BC4D-450B-86D3-31FDCFAB2BCF",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2C47-FE8E-4496-9648-0B264A9A2EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "EEB68246-FD4B-4FB6-9140-63725EA24660",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "110A1CA4-0170-4834-8281-0A3E14FC5584",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF5BE31C-A1A5-45E1-8E75-804FE2BB5E8D",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg20-vpn_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "B0BFA01B-1328-4F96-AE56-D39416A54F0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg20-vpn_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "ABB0C1EC-512C-4A00-84C6-4F93FDD7739F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7239C54F-EC9E-44B4-AE33-1D36E5448219",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9927F99-F8B9-43D6-942B-3BADA5F4970F",
              "versionEndExcluding": "5.37",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg20w-vpn_firmware:5.37:-:*:*:*:*:*:*",
              "matchCriteriaId": "D8470EFC-2AED-45A3-8F4E-CF8EB8EB43D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg20w-vpn_firmware:5.37:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "AFD0A4B7-5A6D-4DAE-9FA4-559F9932A92B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D2AD3A-9197-487D-A267-24DE332CC66B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:uos:1.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "AD61F9D7-0229-4A40-903E-F25F67E547F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:uos:1.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "29B81F51-C82B-4099-99B4-5A53BAAA45C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED28D5ED-B21A-4CD6-947E-9C21EA801B7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100hp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACCFC4B1-37DD-4BF7-86A9-5F0A9A2C1D07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_200h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D15ECD-4942-407A-A62E-9785568C6B78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_200hp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7E9028-1ECB-4D88-84D8-CFC589B429AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE57BCA4-8631-460A-BFE3-BB765E5D009F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_700h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8832743A-99FA-417E-BCE1-4BF7D4CEF9BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and\u00a0USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the \u201cdeviceid\u201d daemon by sending a crafted hostname to an affected device if it has the \u201cDevice Insight\u201d feature enabled."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de cadena de formato en las versiones de firmware de la serie Zyxel ATP desde 4.32 hasta 5.37 Parche 1, versiones de firmware de la serie USG FLEX desde 4.50 hasta 5.37 Parche 1, versiones de firmware de la serie USG FLEX 50(W) desde 4.16 hasta 5.37 Parche 1 y USG20(W) -Las versiones de firmware de la serie VPN desde la 4.16 hasta la 5.37, parche 1, podr\u00edan permitir que un usuario de VPN IPSec autenticado provoque condiciones DoS contra el demonio \"deviceid\" enviando un nombre de host manipulado a un dispositivo afectado si tiene habilitada la funci\u00f3n \"Device Insight\"."
    }
  ],
  "id": "CVE-2023-6399",
  "lastModified": "2025-01-21T18:36:34.413",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.6,
        "source": "security@zyxel.com.tw",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T02:15:49.407",
  "references": [
    {
      "source": "security@zyxel.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024"
    }
  ],
  "sourceIdentifier": "security@zyxel.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "security@zyxel.com.tw",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…