CVE-2024-0816
Zyxel
CVE-2024-0816 is a buffer overflow vulnerability in DX3300-T1 firmware. This flaw could allow an authenticated local attacker to trigger a denial-of-service (DoS) condition. The vulnerability exists in firmware version V5.50(ABVY.4)C0, and can be exploited by executing CLI commands with crafted strings. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 34, indicating a moderate level of risk, lower than critical. Successful exploitation results in DoS, disrupting device functionality. This CVE is significant because it highlights weaknesses in firmware security and the importance of input validation. Although not critical, it still warrants attention and patching to prevent potential disruptions.
Description:
CVE-2024-0816 is a buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0. An authenticated local attacker could exploit this vulnerability by executing a CLI command with crafted strings on an affected device, leading to denial of service (DoS) conditions. The SVRS for this CVE is 34, indicating a moderate risk level.
Key Insights:
- Authenticated Local Attack: The vulnerability requires an attacker to be authenticated on the affected device, making it less likely to be exploited remotely.
- DoS Impact: The vulnerability can cause DoS conditions, disrupting the availability of the affected device.
- Firmware Version: The vulnerability affects only devices running firmware version V5.50(ABVY.4)C0.
Mitigation Strategies:
- Update Firmware: Update the firmware to the latest version to patch the vulnerability.
- Restrict Access: Implement access controls to limit the number of users who can authenticate to the affected device.
- Monitor Network Traffic: Monitor network traffic for suspicious activity that could indicate an exploitation attempt.
Additional Information:
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- Exploit Status: No active exploits have been published.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
- In the Wild: The vulnerability is not known to be actively exploited in the wild.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.