Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)
An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device.
This vulnerability could lead to a thread crash on the affected device, potentially causing a denial of service. The impact is limited to availability, with no direct effect on confidentiality or integrity of the system.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Zyxel has released updated firmware versions to address this vulnerability.
1. Update the firmware to the latest version provided by Zyxel. 2. Limit administrative access to trusted users only. 3. Monitor for any suspicious activities or unexpected device restarts. 4. If immediate patching is not possible, consider temporarily disabling IPv6 functionality if feasible for your network setup.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Feedly found the first article mentioning CVE-2024-38267. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-38267
A CVSS base score of 4.9 has been assigned.
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.04% (Percentile: 14.1%)