Unknown
CVE-2022-43393
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-43393
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An improper check for unusual or exceptional conditions in the HTTP request processing function of Zyxel GS1920-24v2 firmware prior to V4.70(ABMH.8)C0, which could allow an unauthenticated attacker to corrupt the contents of the memory and result in a denial-of-service (DoS) condition on a vulnerable device.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- gs1350-12hp firmware,
- gs1350-18hp firmware,
- gs1350-26hp firmware,
- gs1350-6hp firmware,
- gs1915-24e firmware,
- gs1915-24ep firmware,
- gs1915-8 firmware,
- gs1915-8ep firmware,
- gs1920-24hpv2 firmware,
- gs1920-24v2 firmware,
- gs1920-48hpv2 firmware,
- gs1920-48v2 firmware,
- gs2220-10 firmware,
- gs2220-10hp firmware,
- gs2220-28 firmware,
- gs2220-28hp firmware,
- gs2220-50 firmware,
- gs2220-50hp firmware,
- mgs3500-24s firmware,
- mgs3520-28 firmware,
- mgs3520-28 firmware 4.10(abqm.1)c0,
- mgs3520-28f firmware,
- mgs3530-28 firmware,
- mgs3530-28 firmware 4.10(acfj.0)c0,
- xgs1930-28 firmware,
- xgs1930-28hp firmware,
- xgs1930-52 firmware,
- xgs1930-52hp firmware,
- xgs2210-28 firmware,
- xgs2210-28hp firmware,
- xgs2210-52 firmware,
- xgs2210-52hp firmware,
- xgs2220-30 firmware,
- xgs2220-30f firmware,
- xgs2220-30hp firmware,
- xgs2220-54 firmware,
- xgs2220-54fp firmware,
- xgs2220-54hp firmware,
- xgs4600-32 firmware,
- xgs4600-32f firmware,
- xgs4600-52f firmware,
- xmg1930-30 firmware,
- xmg1930-30hp firmware,
- xs1930-10 firmware,
- xs1930-12f firmware,
- xs1930-12hp firmware,
- xs3800-28 firmware
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: