Improper Input Validation Vulnerabilities in Zyxel Firewall Products
CVE-2022-26531

6.1MEDIUM

Key Information:

Summary

Multiple improper input validation flaws in Zyxel's CLI commands for various firewall and network security products could allow authenticated local attackers to execute malicious payloads. Exploitation may lead to severe consequences such as buffer overflow, potentially resulting in a system crash, which compromises the integrity and availability of the affected systems. The vulnerability spans across several firmware versions, necessitating immediate attention from users and administrators to mitigate risks.

Affected Version(s)

ATP series firmware 4.32 through 5.21

NAP203 firmware <= 6.25(ABFA.7)

NSG series firmware 1.00 through 1.33 Patch 4

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.