Vulnerability Details : CVE-2023-6397
A null pointer dereference vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1 and USG FLEX series firmware versions from 4.50 through 5.37 Patch 1 could allow a LAN-based attacker to cause denial-of-service (DoS) conditions by downloading a crafted RAR compressed file onto a LAN-side host if the firewall has the “Anti-Malware” feature enabled.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2023-6397
- cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp200_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp200_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp500_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp500_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp800_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp800_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100w_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100w_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp700_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp700_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_50_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100ax_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100h_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200h_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200hp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200hp_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500h_firmware:5.37:patch1:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:-:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700h_firmware:5.37:patch1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6397
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6397
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
1.6
|
3.6
|
NIST | 2025-01-21 |
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
Zyxel Corporation | 2024-02-20 |
CWE ids for CVE-2023-6397
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: security@zyxel.com.tw (Secondary)
References for CVE-2023-6397
-
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024
Zyxel security advisory for multiple vulnerabilities in firewalls and APs | Zyxel NetworksVendor Advisory
Jump to