2024-05-21 04:03:28 +00:00
{
"id" : "CVE-2023-37929" ,
"sourceIdentifier" : "security@zyxel.com.tw" ,
"published" : "2024-05-21T02:15:08.470" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:12:29.643" ,
2024-05-21 14:03:59 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-05-21 04:03:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The buffer overflow vulnerability in the CGI program of the VMG3625-T50B firmware version V5.50(ABPM.8)C0 could allow an authenticated remote attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device."
2024-05-26 02:03:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "La vulnerabilidad de desbordamiento del b\u00fafer en el programa CGI de la versi\u00f3n de firmware VMG3625-T50B V5.50(ABPM.8)C0 podr\u00eda permitir que un atacante remoto autenticado cause condiciones de denegaci\u00f3n de servicio (DoS) enviando una solicitud HTTP manipulada a un dispositivo vulnerable."
2024-05-21 04:03:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security@zyxel.com.tw" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-05-21 04:03:28 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2024-05-21 04:03:28 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-05-21 04:03:28 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "security@zyxel.com.tw" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-05-21 04:03:28 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-120"
}
]
}
] ,
"references" : [
{
"url" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024" ,
"source" : "security@zyxel.com.tw"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2024-05-21 04:03:28 +00:00
}
]
}