CVE-2024-38267

Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)

Published: Sep 24, 2024 / Updated: 57d ago

010
CVSS 4.9EPSS 0.04%Medium
CVE info copied to clipboard

Summary

An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device.

Impact

This vulnerability could lead to a thread crash on the affected device, potentially causing a denial of service. The impact is limited to availability, with no direct effect on confidentiality or integrity of the system.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Zyxel has released updated firmware versions to address this vulnerability.

Mitigation

1. Update the firmware to the latest version provided by Zyxel. 2. Limit administrative access to trusted users only. 3. Monitor for any suspicious activities or unexpected device restarts. 4. If immediate patching is not possible, consider temporarily disabling IPv6 functionality if feasible for your network setup.

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2024-38267. See article

Sep 24, 2024 at 1:43 AM / CVE
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 24, 2024 at 1:43 AM
CVE Assignment

NVD published the first details for CVE-2024-38267

Sep 24, 2024 at 2:15 AM
CVSS

A CVSS base score of 4.9 has been assigned.

Sep 24, 2024 at 2:20 AM / nvd
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Sep 24, 2024 at 2:31 AM
EPSS

EPSS Score was set to: 0.04% (Percentile: 14.1%)

Sep 24, 2024 at 9:33 AM
Static CVE Timeline Graph

Affected Systems

Zyxel/dx5401-b1_firmware
+null more

Patches

www.zyxel.com
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

References

Zyxel security advisory for post-authentication memory corruption vulnerabilities in some...
An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser of some DSL/Ethernet CPE, fiber ONT, WiFi extender, and security router versions could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device. An improper restriction of operations within the bounds of a memory buffer in the MAC address parser of some DSL/Ethernet CPE, fiber ONT, WiFi extender, and security router versions could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device.

News

CVE Alert: CVE-2024-38267
Everyone that supports the site helps enable new functionality. Affected Endpoints:
[CERT-daily] Tageszusammenfassung - 24.09.2024
https://www.bleepingcomputer.com/news/security/new-mallox-ransomware-linux-variant-based-on-leaked-kryptina-code/ https://www.bleepingcomputer.com/news/security/new-octo-android-malware-version-impersonates-nordvpn-google-chrome/
Multiple vulnerabilities in Zyxel products
The vulnerability allows a remote user to perform a denial of service (DoS) attack. The vulnerability allows a remote user to perform a denial of service (DoS) attack.
Zyxel security advisory for post-authentication memory corruption vulnerabilities in some...
An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser of some DSL/Ethernet CPE, fiber ONT, WiFi extender, and security router versions could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device. An improper restriction of operations within the bounds of a memory buffer in the MAC address parser of some DSL/Ethernet CPE, fiber ONT, WiFi extender, and security router versions could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device.
CVE-2024-38267 | Zyxel VMG8825-T50K up to 5.50(ABOM.8)C0 IPv6 Address Parser memory corruption
A vulnerability has been found in Zyxel VMG8825-T50K up to 5.50(ABOM.8)C0 and classified as critical . This vulnerability affects unknown code of the component IPv6 Address Parser . The manipulation leads to memory corruption. This vulnerability was named CVE-2024-38267 . The attack can be initiated remotely. There is no exploit available.
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:None
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI