Argument Injection Vulnerability in Zyxel USG/ZyWALL Series Firmware
CVE-2022-26532
7.8HIGH
Key Information:
- Vendor
- Zyxel
- Vendor
- CVE Published:
- 24 May 2022
Summary
A vulnerability exists within the 'packet-trace' CLI command in various Zyxel firmware versions, allowing a local authenticated attacker to inject crafted arguments that could potentially execute arbitrary operating system commands. This poses a significant security risk for network environments relying on affected Zyxel products, highlighting the need for timely updates and strong access controls.
Affected Version(s)
ATP series firmware 4.32 through 5.21
NAP203 firmware <= 6.25(ABFA.7)
NSG series firmware 1.00 through 1.33 Patch 4
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved