Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120)
A buffer overflow vulnerability exists in the CGI program of the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier. This vulnerability could allow an authenticated, LAN-based attacker with administrator privileges to cause denial of service (DoS) conditions via a crafted URL.
If exploited, this vulnerability could lead to a denial of service (DoS) condition on the affected Zyxel switches. This could result in network disruption and potential downtime for systems relying on these switches. The impact is limited to availability, with no direct effect on confidentiality or integrity of the system.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Zyxel has released updated firmware versions to address this vulnerability. The patched versions are: - GS1900-8: Version 2.90(AAHH.0)C0 or later - GS1900-8HP: Version 2.90(AAHI.0)C0 or later - GS1900-10HP: Version 2.90(AAZI.0)C0 or later - GS1900-16: Version 2.90(AAHJ.0)C0 or later - GS1900-24: Version 2.90(AAHL.0)C0 or later - GS1900-24E: Version 2.90(AAHK.0)C0 or later - GS1900-24EP: Version 2.90(ABTO.0)C0 or later - GS1900-24HPv2: Version 2.90(ABTP.0)C0 or later - GS1900-48: Version 2.90(AAHN.0)C0 or later - GS1900-48HPv2: Version 2.90(ABTQ.0)C0 or later
1. Update affected Zyxel GS1900 series switches to the latest firmware versions as provided by the vendor. 2. If immediate patching is not possible, implement network segmentation to restrict access to the affected switches from untrusted networks. 3. Ensure that only authorized administrators have access to the switch management interface. 4. Monitor for any suspicious activities or unexpected behaviors on the affected switches. 5. Implement strong authentication mechanisms for administrator accounts. 6. Regularly review and audit administrator account access and activities.
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
NVD published the first details for CVE-2024-8882
Feedly found the first article mentioning CVE-2024-8882. See article
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.04% (Percentile: 10.1%)