{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6399","assignerOrgId":"96e50032-ad0d-4058-a115-4d2c13821f9f","state":"PUBLISHED","assignerShortName":"Zyxel","dateReserved":"2023-11-30T07:58:19.503Z","datePublished":"2024-02-20T01:42:21.027Z","dateUpdated":"2024-08-02T08:28:21.797Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"ATP series firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"version 4.32 through 5.37 Patch 1"}]},{"defaultStatus":"unaffected","product":"USG FLEX series firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"version 4.50 through 5.37 Patch 1"}]},{"defaultStatus":"unaffected","product":" USG FLEX 50(W) series firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"version 4.16 through 5.37 Patch 1"}]},{"defaultStatus":"unaffected","product":"USG20(W)-VPN series firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"version 4.16 through 5.37 Patch 1"}]},{"defaultStatus":"unaffected","product":"USG FLEX H series firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"version 1.10 through 1.10 Patch 1"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and&nbsp;USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled."}],"value":"A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-134","description":"CWE-134 Use of Externally-Controlled Format String","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"96e50032-ad0d-4058-a115-4d2c13821f9f","shortName":"Zyxel","dateUpdated":"2024-02-21T09:20:18.921Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-6399","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-02-20T15:30:36.983773Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-05T17:21:43.465Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:28:21.797Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024"}]}]}}