Zyxel ATP, USG FLEX, and USG20(W)-VPN Series Directory Traversal Vulnerability
CVE-2024-11667 Published on November 27, 2024

A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.

Vendor Advisory NVD

Known Exploited Vulnerability

This Zyxel Multiple Firewalls Path Traversal Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Multiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL.

The following remediation steps are recommended / required by December 24, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2024-11667 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

What is a Directory traversal Vulnerability?

The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CVE-2024-11667 has been classified to as a Directory traversal vulnerability or weakness.


Products Associated with CVE-2024-11667

Want to know whenever a new CVE is published for Zyxel products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Zyxel ATP series firmware: Zyxel USG FLEX series firmware: Zyxel USG FLEX 50(W) series firmware: Zyxel USG20(W)-VPN series firmware: zyxel usg_flex_firmware: zyxel atp_firmware: zyxel usg20-vpn_firmware: zyxel usg_flex_50w_firmware:

Exploit Probability

EPSS
34.19%
Percentile
96.93%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.