Multiple vulnerabilities in Zyxel WiFi products

Published: 2021-05-17

Security Advisory



1) Input validation error


Risk: Low


CVSSv3.1: 4.6 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]


CVE-ID: CVE-2020-24586


CWE-ID: CWE-20 - Improper Input Validation


Exploit availability: No


Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.


The vulnerability exists in the 802.11 standard due to the affected device does not clear its cache/memory to remove fragments of an incomplete MSDU/MMPDU from previous session after reconnection/reassociation. A remote attacker on the local network can perform a fragment cache attack and perform a denial of service (DoS) attack.


Mitigation

Install updates from vendor's website.


Vulnerable software versions

WAH7706: All versions


LTE4506-M606: All versions


USG60W: All versions


USG40W: All versions


WX3310-B0: before 1.00(ABSF.2)C0


WRE6605: All versions


WRE6602: All versions


WRE6505 v2: All versions


WRE2206: All versions


WAP6806: All versions


WAP6804: All versions


WAP3205 v3: All versions


NWD6605: All versions


NWD6602: All versions


NWD6505: All versions


NBG7815 (Armor G5): All versions


NBG6818 (Armor G1): All versions


NBG6817 (Armor Z2): All versions
Support the originator by clicking the read the rest link below.