Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-38243 | A command injection vulnerability in the access point (AP) management feature of the Zyxel ATP series firmware versions 5.00 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.00 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.00 through 5.36 Patch 2, VPN series firmware versions 5.00 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the managed AP list in advance. |
Tue, 29 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zyxel atp
Zyxel usg20w-vpn Firmware Zyxel usg Flex Zyxel vpn Firmware |
|
| CPEs | cpe:2.3:h:zyxel:atp:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:nxc2500_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:nxc5500_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Zyxel atp
Zyxel usg20w-vpn Firmware Zyxel usg Flex Zyxel vpn Firmware |
|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2024-10-29T16:06:41.479Z
Reserved: 2023-05-26T03:44:51.339Z
Link: CVE-2023-34141
Updated: 2024-08-02T16:01:53.937Z
Status : Modified
Published: 2023-07-17T18:15:09.770
Modified: 2024-11-21T08:06:38.180
Link: CVE-2023-34141
No data.
OpenCVE Enrichment
No data.
EUVD