CVE-2025-9133
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-21

Last updated on: 2025-10-28

Assigner: Zyxel Corporation

Description
A missing authorization vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.40, USG FLEX series firmware versions from V4.50 through V5.40, USG FLEX 50(W) series firmware versions from V4.16 through V5.40, and USG20(W)-VPN series firmware versions from V4.16 through V5.40 could allow a semi-authenticated attackerβ€”who has completed only the first stage of the two-factor authentication (2FA) processβ€”to view and download the system configuration from an affected device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-21
Last Modified
2025-10-28
Generated
2026-05-07
AI Q&A
2025-10-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 19 associated CPEs
Vendor Product Version / Range
zyxel zld From 4.32 (inc) to 5.41 (exc)
zyxel atp100 *
zyxel atp100w *
zyxel atp200 *
zyxel atp500 *
zyxel atp700 *
zyxel atp800 *
zyxel zld From 4.50 (inc) to 5.41 (exc)
zyxel usg_flex_100 *
zyxel usg_flex_100ax *
zyxel usg_flex_100w *
zyxel usg_flex_200 *
zyxel usg_flex_50 *
zyxel usg_flex_500 *
zyxel usg_flex_50ax *
zyxel usg_flex_700 *
zyxel zld From 4.16 (inc) to 5.41 (exc)
zyxel usg_20w-vpn *
zyxel usg_flex_50w *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a missing authorization flaw in certain Zyxel device firmware versions. It allows a semi-authenticated attacker, who has only completed the first stage of two-factor authentication, to view and download the system configuration from the affected device without proper authorization.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability could gain access to sensitive system configuration information, potentially leading to further attacks, unauthorized changes, or exposure of confidential network details. This could compromise the security and integrity of the affected device and the network it protects.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart