- Description
- A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.
- Source
- security@zyxel.com.tw
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Zyxel Multiple Firewalls Path Traversal Vulnerability
- Exploit added on
- Dec 3, 2024
- Exploit action due
- Dec 24, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- security@zyxel.com.tw
- CWE-22
- Hype score
- Not currently trending
5/13 🗂️ Zyxel's Path Traversal Danger CVE-2024-11667 - Attackers can mess with your files. Update your firewalls before it's too late! #NetworkSecurity #ZyxelAlert
@Eth1calHackrZ
10 Dec 2024
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
1/9 CISA warns of active exploitation of Zyxel firewall flaw, CVE-2024-11667! Protect your network from path traversal attacks now. 🔒 #ZyxelVulnerability #CyberSecurity
@Eth1calHackrZ
10 Dec 2024
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
2/9 @ZyxelNews firewalls (ATP, USG FLEX, USG20(W)-VPN) under attack! Update to firmware 5.39+ to block CVE-2024-11667 exploits. 📡 #FirewallSecurity #PatchNow
@Eth1calHackrZ
10 Dec 2024
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-38144 2 - CVE-2024-41713 3 - CVE-2024-39343 4 - CVE-2024-11667 5 - CVE-2024-49019 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
9 Dec 2024
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zyxel の脆弱性 CVE-2024-11667:Helldown ランサムウェア展開での悪用を検出 https://t.co/iz4KOPXBaY Zyxel ファイアウォールの脆弱性ですが、Helldown ランサムウェアによる悪用が確認されているようです。すでにパッチがリリースされていますので、ご利用のチームは確認してみてください。… https://t.co/8kQ4EaR4LN
@iototsecnews
9 Dec 2024
104 Impressions
1 Retweet
0 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 Zyxel Firewall Vulnerability Alert! 🚨 🛡️ CVE-2024-11667 📍 Impact: Directory traversal flaw in Zyxel firewalls (Firmware V5.00-V5.38) ⚠️ Threat: Attackers can upload/download files via manipulated URLs, risking system integrity. 🔐 Mitigations: ✅ Update firmware to the… htt
@GHak2learn27752
6 Dec 2024
390 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA Warns of Exploitation of Flaws in ProjectSend, CyberPanel, and Zyxel: CVE-2024-51378 CVE-2023-45727 CVE-2024-11680 CVE-2024-11667 CVE-2024-45841 CVE-2024-47133 CVE-2024-52564 https://t.co/qerETOTK91
@vault33org
5 Dec 2024
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【独自】Zyxel Firewallの脆弱性CVE-2024-11667が、サイバーセキュリティ・社会基盤安全保障庁(CISA)の既知の悪用された脆弱性(KEV)カタログ上ランサムウェアによる悪用確認済みに更新。なお、KEV掲載時点でドイツCERT Germanyからランサムウェアによる悪用の報告がされていた。 https://t.co/TC6YO19pag
@__kokumoto
4 Dec 2024
619 Impressions
0 Retweets
0 Likes
1 Bookmark
1 Reply
0 Quotes
CVE-2024-11667 is getting exploited #inthewild. Find out more at https://t.co/3DJJRw40Uh CVE-2024-11680 is getting exploited #inthewild. Find out more at https://t.co/fRRrITY2ke CVE-2023-45727 is getting exploited #inthewild. Find out more at https://t.co/qiH2XzNI4L
@inthewildio
4 Dec 2024
106 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
csirt_it: ‼️ Rilevato lo sfruttamento attivo in rete della vulnerabilità CVE-2024-11667 – già sanata dal vendor – in alcuni firewall #Zyxel Rischio: 🟠 🔗 https://t.co/Gcp4fvUDmZ ⚠ Importante aggiornare i prodotti interessati https://t.co/jAUNocuMyU
@Vulcanux_
4 Dec 2024
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
‼️ Rilevato lo sfruttamento attivo in rete della vulnerabilità CVE-2024-11667 – già sanata dal vendor – in alcuni firewall #Zyxel Rischio: 🟠 🔗 https://t.co/KJVEqRYLgq ⚠ Importante aggiornare i prodotti interessati https://t.co/jgmeN78KH7
@csirt_it
4 Dec 2024
378 Impressions
2 Retweets
6 Likes
0 Bookmarks
0 Replies
1 Quote
Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2024-11667 #Zyxel Multiple Firewalls Path Traversal Vulnerability https://t.co/bI2L4t74qq
@ScyScan
3 Dec 2024
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Three Known Exploited Vulnerabilities to Catalog: CVE-2024-11667 - Zyxel Multiple Firewalls Path Traversal CVE-2024-11680 - ProjectSend Improper Authentication CVE-2023-45727 - North Grid Proself Improper Restriction of XML External Entity (XEE) Reference… https://t.co/
@TMJIntel
3 Dec 2024
63 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE Alert: Zyxel Directory Traversal Vulnerability Exploited In The Wild🚨 Vulnerability Details: CVE-2024-11667 (CVSS 7.5/10) Zyxel Directory Traversal Vulnerability Impact A Successful exploit may allows an attacker to download or upload files via a crafted URL. Affected…
@CyberxtronTech
3 Dec 2024
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
برای فایروال Zyxel آسیب پذیری با کد شناسایی CVE-2024-11667 و از نوع Directory Traversal منتشر شده است. این آسیب پذیری در قسمت Web management مربوط به این فایروال وجود دارد. نسخه های بین 5.00 تا 5.38 این محصول دارای این آسیب پذیری هستند. https://t.co/Poz3aKY03t https://t.co/WruZWy
@AmirHossein_sec
2 Dec 2024
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A directory traversal flaw in Zyxel Firewalls is being actively exploited in the wild. CVE-2024-11667 is a directory traversal flaw in the web management interface of ZLD firewall firmware. Exploitation allows threat actors to send maliciously crafted URLs to bypass directory… h
@cybercitizen7
2 Dec 2024
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11667: Critical Vulnerability in Zyxel Firewalls Actively Exploited https://t.co/kyzwtLejP4
@CrowdCyber_Com
30 Nov 2024
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zyxel Firewalls exploited using CVE-2024-11667 #ZyxelFirewalls #CVE-2024-11667 https://t.co/jjBRPBIItP
@pravin_karthik
29 Nov 2024
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Vague d'attaques exploitant les vulnérabilités du pare-feu Zyxel. Les versions 5.00 à 5.38 sont affectées (CVE-2024-11667). Mettez à jour vos systèmes dès que possible ! #Cybersécurité, #Cyberattaques, #Zyxel, #PareFeu https://t.co/XlAdIamOf9 https://t.co/iY3QwjHVlk
@bexxoch
29 Nov 2024
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11667: Kritisk sårbarhet i Zyxel brannmurer utnyttes aktivt. Integer Overflow-sårbarhet i Windows-driver muliggjør Privilege Escalation, PoC publisert. CVE-2024-52951 XSS i Omada Identity. https://t.co/WklSosXveP
@TelenorSOC
29 Nov 2024
79 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11667: Directory Traversal in Zyxel Firewalls, 7.3 rating❗️ Vuln in the web interface of some firewalls allows an attacker to download or upload files. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/l3Umxq6cb0 #cybersecurity #vulnerability_map #zyxel https:/
@Netlas_io
29 Nov 2024
354 Impressions
2 Retweets
10 Likes
2 Bookmarks
0 Replies
0 Quotes
CVE-2024-11667: Critical Vulnerability in Zyxel Firewalls Actively Exploited https://t.co/BmuPG1tM7v
@Dinosn
29 Nov 2024
2534 Impressions
10 Retweets
19 Likes
6 Bookmarks
0 Replies
1 Quote
CVE-2024-11667: Critical Vulnerability in Zyxel Firewalls Actively Exploited Beware of the critical vulnerability CVE-2024-11667 in #Zyxel firewalls. Learn how attackers are exploiting it to deploy Helldown ransomware. https://t.co/14FZrgih2L
@the_yellow_fall
29 Nov 2024
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
German CERT warns that Zyxel firewalls are being exploited via a critical vulnerability (CVE-2024-11667) to deploy Helldown ransomware, urging immediate firmware updates and enhanced security measures to mitigate risks. #CyberSecurity #Ransomware https://t.co/F1e4WctDQL
@Cyber_O51NT
29 Nov 2024
650 Impressions
2 Retweets
5 Likes
3 Bookmarks
0 Replies
0 Quotes
CVE-2024-11667 A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00… https://t.co/Y2Nck8ADqq
@CVEnew
27 Nov 2024
495 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18B592F1-F584-4573-AD75-398CE03F6627", "versionEndIncluding": "5.38", "versionStartIncluding": "5.00" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:atp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "788B28B2-E2EE-4D98-8862-15B121009B6E" }, { "criteria": "cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7F7654A1-3806-41C7-82D4-46B0CD7EE53B" }, { "criteria": "cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "47398FD0-6C5E-4625-9EFD-DE08C9AB7DB2" }, { "criteria": "cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D68A36FF-8CAF-401C-9F18-94F3A2405CF4" }, { "criteria": "cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2818E8AC-FFEE-4DF9-BF3F-C75166C0E851" }, { "criteria": "cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0B41F437-855B-4490-8011-DF59887BE6D5" }, { "criteria": "cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "66B99746-0589-46E6-9CBD-F38619AD97DC" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18B592F1-F584-4573-AD75-398CE03F6627", "versionEndIncluding": "5.38", "versionStartIncluding": "5.00" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:usg_flex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E4EDCC3C-8EE5-43D3-8739-34987F025DF2" }, { "criteria": "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B30A4C0-9928-46AD-9210-C25656FB43FB" }, { "criteria": "cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "03036815-04AE-4E39-8310-DA19A32CFA48" }, { "criteria": "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D74ABA7E-AA78-4A13-A64E-C44021591B42" }, { "criteria": "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F93B6A06-2951-46D2-A7E1-103D7318D612" }, { "criteria": "cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "646C1F07-B553-47B0-953B-DC7DE7FD0F8B" }, { "criteria": "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "92C697A5-D1D3-4FF0-9C43-D27B18181958" }, { "criteria": "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9D1396E3-731B-4D05-A3F8-F3ABB80D5C29" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBEE7B76-74EB-4570-9A5B-071BA9E36DB9", "versionEndIncluding": "5.38", "versionStartIncluding": "5.10" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "110A1CA4-0170-4834-8281-0A3E14FC5584" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBEE7B76-74EB-4570-9A5B-071BA9E36DB9", "versionEndIncluding": "5.38", "versionStartIncluding": "5.10" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6BEA412F-3DA1-4E91-9C74-0666147DABCE" } ], "operator": "OR" } ], "operator": "AND" } ]