CVE-2024-5412

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120)

Published: Sep 3, 2024 / Updated: 2mo ago

010
CVSS 7.5EPSS 0.05%High
CVE info copied to clipboard

Summary

A buffer overflow vulnerability exists in the library "libclinkc" of the Zyxel VMG8825-T50K firmware version 5.50(ABOM.8)C0. This vulnerability could allow an unauthenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.

Impact

The vulnerability allows an unauthenticated attacker to cause denial of service (DoS) conditions on affected Zyxel devices. This could lead to service disruptions and potentially impact the availability of network services provided by these devices. The attack can be initiated remotely over the network, requires no user interaction, and has a low attack complexity, making it relatively easy to exploit.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Zyxel has released firmware updates to address this vulnerability for multiple affected products. The security advisory with patch information was published on September 6, 2024.

Mitigation

1. Update affected Zyxel devices to the latest firmware versions as provided by the vendor. 2. For the VMG8825-T50K specifically, update to a firmware version newer than 5.50(ABOM.8.4)C0. 3. If immediate patching is not possible, implement network segmentation and access controls to limit exposure of vulnerable devices. 4. Monitor for unusual network activity or unexpected device behavior that could indicate exploitation attempts. 5. Consider implementing intrusion detection/prevention systems (IDS/IPS) to detect and block potential exploitation attempts.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-5412

Sep 3, 2024 at 2:15 AM
First Article

Feedly found the first article mentioning CVE-2024-5412. See article

Sep 3, 2024 at 2:21 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 3, 2024 at 2:21 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 17.7%)

Sep 3, 2024 at 9:38 AM
Static CVE Timeline Graph

Affected Systems

Zyxel/nr7103_firmware
+null more

Patches

www.zyxel.com
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

References

Zyxel security advisory for buffer overflow vulnerability in some 5G NR CPE, DSL/Ethernet CPE, fiber ONT, WiFi extender, and security router devices
CVE: CVE-2024-5412 Summary Zyxel has released patches for some 5G NR/4G LTE CPE, DSL/Ethernet CPE, fiber ONT, WiFi extender, and security router devices affected by a buffer overflow vulnerability. For end-users who purchased your Zyxel device yourself, please contact your local Zyxel support team for the new firmware file to ensure optimal protection, or visit Zyxel’s Community for further assistance.

News

Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers
CVE-2024-6343 (CVSS score: 4.9) – A buffer overflow vulnerability that could allow an authenticated attacker with administrator privileges to trigger DoS conditions by means of a specially crafted HTTP request CVE-2024-5412 (CVSS score: 7.5) – A buffer overflow vulnerability in the “libclinkc” library that could allow an unauthenticated attacker to cause DoS conditions by means of a specially crafted HTTP request
Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers
CVE-2024-6343 (CVSS score: 4.9) – A buffer overflow vulnerability that could allow an authenticated attacker with administrator privileges to trigger DoS conditions by means of a specially crafted HTTP request CVE-2024-5412 (CVSS score: 7.5) – A buffer overflow vulnerability in the “libclinkc” library that could allow an unauthenticated attacker to cause DoS conditions by means of a specially crafted HTTP request
Multiple Vulnerabilities in Zyxel Products
Released Last Updated: 9/6/2024 CVEs: CVE-2024-42057 , CVE-2024-42061 , CVE-2024-6343 , CVE-2024-7203 , CVE-2024-5412 , CVE-2024-7261 , CVE-2024-42060 , CVE-2024-42058 , CVE-2024-42059 Plugins: 206734 , 206735 , 206736 , 206737 , 206738
Zyxel Patched Numerous Security Flaws Across Different Products - Latest Hacking News
Zyxel began the month by releasing numerous security fixes for flaws in its firewalls and router devices. The most critical security vulnerability affected its routers, exploiting which could allow OS command injection.
Zyxel issues patches for nine critical vulnerabilities affecting over 50 access points and routers
The company recently listed nine serious security flaws in over 50 products, ranging from access points to firewalls. On Tuesday, networking OEM Zyxel listed nine security advisories affecting dozens of its products.
See 26 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:None
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI