HIGH · 7.2

CVE-2023-5372

The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated at...

Vulnerability Description

The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface.

CVSS Score

7.2

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
ZyxelNas326 Firmware< 5.21\(aazf.16\)c0
ZyxelNas326-
ZyxelNas542 Firmware< 5.21\(abag.13\)c0
ZyxelNas542-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-5372?

CVE-2023-5372 is a vulnerability with a CVSS score of 7.2 (HIGH). The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated at...

How severe is CVE-2023-5372?

CVE-2023-5372 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-5372?

Check the references section above for vendor advisories and patch information. Affected products include: Zyxel Nas326 Firmware, Zyxel Nas326, Zyxel Nas542 Firmware, Zyxel Nas542.