Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.01262.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Zyxel
Subscribe
|
Atp100
Subscribe
Atp100 Firmware
Subscribe
Atp100w
Subscribe
Atp100w Firmware
Subscribe
Atp200
Subscribe
Atp200 Firmware
Subscribe
Atp500
Subscribe
Atp500 Firmware
Subscribe
Atp700
Subscribe
Atp700 Firmware
Subscribe
Atp800
Subscribe
Atp800 Firmware
Subscribe
Usg20-vpn
Subscribe
Usg20-vpn Firmware
Subscribe
Usg20w-vpn
Subscribe
Usg20w-vpn Firmware
Subscribe
Usg40
Subscribe
Usg40 Firmware
Subscribe
Usg40w
Subscribe
Usg40w Firmware
Subscribe
Usg60
Subscribe
Usg60 Firmware
Subscribe
Usg60w
Subscribe
Usg60w Firmware
Subscribe
Usg 2200-vpn
Subscribe
Usg 2200-vpn Firmware
Subscribe
Usg Flex 100w
Subscribe
Usg Flex 100w Firmware
Subscribe
Usg Flex 200
Subscribe
Usg Flex 200 Firmware
Subscribe
Usg Flex 500
Subscribe
Usg Flex 500 Firmware
Subscribe
Usg Flex 50w
Subscribe
Usg Flex 50w Firmware
Subscribe
Usg Flex 700
Subscribe
Usg Flex 700 Firmware
Subscribe
Vpn100
Subscribe
Vpn1000
Subscribe
Vpn1000 Firmware
Subscribe
Vpn100 Firmware
Subscribe
Vpn300
Subscribe
Vpn300 Firmware
Subscribe
Vpn50
Subscribe
Vpn50 Firmware
Subscribe
Zywall 110
Subscribe
Zywall 1100
Subscribe
Zywall 1100 Firmware
Subscribe
Zywall 110 Firmware
Subscribe
Zywall 310
Subscribe
Zywall 310 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34334 | A directory traversal vulnerability caused by specific character sequences within an improperly sanitized URL was identified in some CGI programs of Zyxel USG FLEX 100(W) firmware versions 4.50 through 5.30, USG FLEX 200 firmware versions 4.50 through 5.30, USG FLEX 500 firmware versions 4.50 through 5.30, USG FLEX 700 firmware versions 4.50 through 5.30, USG FLEX 50(W) firmware versions 4.16 through 5.30, USG20(W)-VPN firmware versions 4.16 through 5.30, ATP series firmware versions 4.32 through 5.30, VPN series firmware versions 4.30 through 5.30, USG/ZyWALL series firmware versions 4.11 through 4.72, that could allow an authenticated attacker to access some restricted files on a vulnerable device. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2024-08-03T00:24:44.144Z
Reserved: 2022-06-08T00:00:00
Link: CVE-2022-2030
No data.
Status : Modified
Published: 2022-07-19T06:15:08.383
Modified: 2024-11-21T07:00:12.173
Link: CVE-2022-2030
No data.
OpenCVE Enrichment
No data.
EUVD