diff --git a/doc/cna_readme_notes/cnas_with_html_advisories.md b/doc/cna_readme_notes/cnas_with_html_advisories.md index 7f9f444..396455e 100644 --- a/doc/cna_readme_notes/cnas_with_html_advisories.md +++ b/doc/cna_readme_notes/cnas_with_html_advisories.md @@ -491,6 +491,28 @@ https://cert.vde.com/en/advisories/ ### Advisory https://www.checkpoint.com/advisories/ #### Captured Data Potential From Advisory +``` +{ + :bulletin_id => 'CPAI-2022-0251', + :date_published => 'May 19, 2022', + :severity => 'Critical', + :last_updated => 'Thursday 19 May, 2022', + :source => '', + :cve_id => 'CVE-2022-30525', + :protection_provided_by => 'Security Gateway R81, R80, R77, R75', + :who_is_vulnerable => [ + 'Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1', + 'Zyxel USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1', + 'Zyxel USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1', + 'Zyxel USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1', + 'Zyxel USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1', + 'Zyxel USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1', + 'Zyxel ATP series firmware versions 5.10 through 5.21 Patch 1', + 'Zyxel VPN series firmware versions 4.60 through 5.21 Patch 1' + ], + :vulnerability_description => 'A command injection vulnerability exists in Zyxel USG. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary commands on the affected system.' +} +``` ## Chrome ### Advisory