A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.36 Patch 2, USG FLEX series firmware versions 4.50 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.16 through 5.36 Patch 2, VPN series firmware versions 4.30 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to cause denial of service (DoS) conditions by sending a crafted request to the CAPWAP daemon.
History

Mon, 21 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zyxel

Published: 2023-07-17T17:49:38.175Z

Updated: 2024-10-21T19:42:15.688Z

Reserved: 2023-05-26T03:44:51.339Z

Link: CVE-2023-34140

cve-icon Vulnrichment

Updated: 2024-08-02T16:01:54.194Z

cve-icon NVD

Status : Analyzed

Published: 2023-07-17T18:15:09.667

Modified: 2023-07-26T21:29:58.263

Link: CVE-2023-34140

cve-icon Redhat

No data.