CVE-2022-45854

Improper Check for Unusual or Exceptional Conditions (CWE-754)

Published: Feb 7, 2023 / Updated: 21mo ago

010
CVSS 4.3EPSS 0.04%Medium
CVE info copied to clipboard

An improper check for unusual conditions in Zyxel NWA110AX firmware verisons prior to 6.50(ABTG.0)C0, which could allow a LAN attacker to cause a temporary denial-of-service (DoS) by sending crafted VLAN frames if the MAC address of the vulnerable AP were intercepted by the attacker.

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Timeline

First Article

Feedly found the first article mentioning CVE-2022-45854. See article

Feb 7, 2023 at 1:49 AM / twitter.com
EPSS

EPSS Score was set to: 0.04% (Percentile: 10.8%)

Sep 20, 2023 at 6:35 AM
Static CVE Timeline Graph

Affected Systems

Zyxel/wax510d_firmware
+null more

Patches

www.zyxel.com
+null more

News

CVE-2022-45854
An improper check for unusual conditions in Zyxel NWA110AX firmware verisons prior to 6.50(ABTG.0)C0, which could allow a LAN attacker to cause a temporary denial-of-service (DoS) by sending crafted VLAN frames if the MAC address of the vulnerable AP were intercepted by the attacker. CVE-2022-45854 originally published on CyberSecurityBoard
Zyxel NWA110AX devices denial of service | CVE-2022-45854
Zyxel NWA110AX devices are vulnerable to a denial of service, caused by an improper check for unusual conditions. Zyxel NWA110AX devices denial of service
ubuntu-cve-tracker - [no description]
+ `sasl.jaas.config` property for any of the connector's Kafka clients to + properties in connector configurations for Kafka Connect clusters running
CVE-2022-45854
- CVSS Scores & Vulnerability Types If the vulnerability is created recently it may take a few days to gather vulnerable products list and other information like cvss scores.
CVE-2022-45854
An improper check for unusual conditions in Zyxel NWA110AX firmware verisons prior to 6.50(ABTG.0)C0, which could allow a LAN attacker to cause a temporary denial-of-service (DoS) by sending crafted VLAN frames if the MAC address of the vulnerable AP were intercepted by the attacker. (CVSS:0.0) (Last Update:2023-02-07)
See 9 more articles and social media posts

CVSS V3.1

Attack Vector:Adjacent_network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:None
Availability Impact:Low

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI