{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-40603","assignerOrgId":"96e50032-ad0d-4058-a115-4d2c13821f9f","assignerShortName":"Zyxel","dateUpdated":"2025-04-23T20:00:23.891Z","dateReserved":"2022-09-12T00:00:00.000Z","datePublished":"2022-12-06T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"96e50032-ad0d-4058-a115-4d2c13821f9f","shortName":"Zyxel","dateUpdated":"2022-12-06T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A cross-site scripting (XSS) vulnerability in the CGI program of Zyxel ZyWALL/USG series firmware versions 4.30 through 4.72, VPN series firmware versions 4.30 through 5.31, USG FLEX series firmware versions 4.50 through 5.31, and ATP series firmware versions 4.32 through 5.31, which could allow an attacker to trick a user into visiting a crafted URL with the XSS payload. Then, the attacker could gain access to some browser-based information if the malicious script is executed on the victim’s browser."}],"affected":[{"vendor":"Zyxel","product":"ZyWALL/USG series firmware","versions":[{"version":"4.30 through 4.72","status":"affected"}]},{"vendor":"Zyxel","product":"VPN series firmware","versions":[{"version":"4.30 through 5.31","status":"affected"}]},{"vendor":"Zyxel","product":"USG FLEX series firmware","versions":[{"version":"4.50 through 5.31","status":"affected"}]},{"vendor":"Zyxel","product":"ATP series firmware","versions":[{"version":"4.32 through 5.31","status":"affected"}]}],"references":[{"url":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-xss-vulnerability-in-firewalls"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:21:46.447Z"},"title":"CVE Program Container","references":[{"url":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-xss-vulnerability-in-firewalls","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T20:00:17.861955Z","id":"CVE-2022-40603","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T20:00:23.891Z"}}]}}