Zyxel ATP, USG FLEX, and USG20(W)-VPN Series Directory Traversal Vulnerability
CVE-2024-11667 Published on November 27, 2024
A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.
Known Exploited Vulnerability
This Zyxel Multiple Firewalls Path Traversal Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Multiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL.
The following remediation steps are recommended / required by December 24, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-11667 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
What is a Directory traversal Vulnerability?
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CVE-2024-11667 has been classified to as a Directory traversal vulnerability or weakness.
Products Associated with CVE-2024-11667
Want to know whenever a new CVE is published for Zyxel products? stack.watch will email you.
Affected Versions
Zyxel ATP series firmware:- Version versions V5.00 through V5.38 is affected.
- Version versions V5.00 through V5.38 is affected.
- Version versions V5.10 through V5.38 is affected.
- Version versions V5.10 through V5.38 is affected.
- Version 5.00, <= 5.38 is affected.
- Version 5.00, <= 5.38 is affected.
- Version 5.10, <= 5.38 is affected.
- Version 5.10 and below 5.38 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.