Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11667: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Zyxel ATP series firmware

0
High
VulnerabilityCVE-2024-11667cvecve-2024-11667cwe-22
Published: Wed Nov 27 2024 (11/27/2024, 09:39:41 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: ATP series firmware

Description

A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:52:34 UTC

Technical Analysis

CVE-2024-11667 is a directory traversal vulnerability classified under CWE-22 found in multiple Zyxel firewall and unified threat management (UTM) devices, specifically the ATP series, USG FLEX series, USG FLEX 50(W), and USG20(W)-VPN series firmware versions from V5.00 through V5.38. The vulnerability resides in the web management interface, where insufficient validation of pathname inputs allows an attacker to manipulate URL parameters to traverse directories outside the intended restricted directory. This can lead to unauthorized file downloads or uploads, potentially exposing sensitive configuration files, credentials, or enabling the attacker to place malicious files on the device. The CVSS 3.1 base score is 7.5 (high), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) without affecting integrity or availability. The vulnerability is exploitable remotely without authentication, increasing its risk profile. Although no public exploits are currently known, the flaw's nature and ease of exploitation make it a critical concern for organizations relying on these Zyxel devices for perimeter security. The lack of available patches at the time of disclosure necessitates immediate compensating controls to reduce exposure.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information such as VPN credentials, firewall configurations, or internal network details, undermining confidentiality. Attackers could also upload malicious files, potentially enabling further compromise or persistent access. Given that Zyxel devices are commonly deployed in enterprise, government, and critical infrastructure networks across Europe, exploitation could disrupt secure communications and network defenses. The vulnerability's remote, unauthenticated nature increases the likelihood of exploitation by external threat actors, including cybercriminals and nation-state actors. This risk is heightened in sectors with stringent data protection requirements under GDPR, where data breaches could result in regulatory penalties and reputational damage. Additionally, the exposure of security appliance configurations could facilitate lateral movement and deeper network infiltration, impacting overall organizational security posture.

Mitigation Recommendations

Until official patches are released by Zyxel, European organizations should implement strict network segmentation to isolate management interfaces from untrusted networks, ideally restricting access to trusted administrative IP addresses only. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious URL patterns indicative of directory traversal attempts. Regularly monitor device logs and network traffic for anomalous access attempts targeting the web management interface. Disable remote management over the internet if not strictly necessary, or enforce VPN-based access with strong multi-factor authentication. Maintain an inventory of all affected Zyxel devices and track vendor communications for patch availability. Once patches are available, prioritize timely firmware updates. Additionally, conduct security awareness training for administrators to recognize and respond to potential exploitation signs. Employ network-level anomaly detection to identify unusual file transfer activities that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zyxel
Date Reserved
2024-11-25T07:15:56.063Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b0247d717aace268a9

Added to database: 10/21/2025, 7:06:24 PM

Last enriched: 10/21/2025, 7:52:34 PM

Last updated: 10/29/2025, 10:22:22 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats