CVE-2024-42061
NixOS vulnerability analysis and mitigation

Overview

A reflected cross-site scripting (XSS) vulnerability (CVE-2024-42061) was discovered in the CGI program 'dynamic_script.cgi' of multiple Zyxel firewall series. The affected products include ATP series firmware (V4.32-V5.38), USG FLEX series firmware (V4.50-V5.38), USG FLEX 50(W) series firmware (V4.16-V5.38), and USG20(W)-VPN series firmware (V4.16-V5.38). The vulnerability was disclosed on September 2, 2024, and received a CVSS v3.1 base score of 6.1 (Medium) (NVD, Zyxel Advisory).

Technical details

The vulnerability exists in the CGI program 'dynamic_script.cgi' and is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The issue allows an attacker to execute malicious scripts by tricking users into visiting a crafted URL containing an XSS payload. The vulnerability has been assigned a CVSS v3.1 base score of 6.1, with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).

Impact

If successfully exploited, the vulnerability could allow attackers to obtain browser-based information if the malicious script is executed on the victim's browser. The attack requires user interaction, specifically requiring the target to visit a malicious page or open a malicious file (Hacker News, Zyxel Advisory).

Mitigation and workarounds

Zyxel has released patches to address this vulnerability in firmware version ZLD V5.39. Users of affected devices are strongly advised to upgrade their firmware to the latest version. The patch is available for all affected product lines including ATP series, USG FLEX series, USG FLEX 50(W), and USG20(W)-VPN series (Zyxel Advisory).

Community reactions

The vulnerability was discovered and reported by nella17 from DEVCORE, demonstrating the active involvement of security researchers in identifying and responsibly disclosing security issues (Zyxel Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-4370CRITICAL10
  • NixOSNixOS
  • juju
NoYesApr 01, 2026
CVE-2026-34235MEDIUM6.9
  • NixOSNixOS
  • pjsip
NoYesMar 31, 2026
CVE-2026-34730MEDIUM5.5
  • PythonPython
  • copier
NoYesApr 02, 2026
CVE-2026-32113MEDIUM5.1
  • NixOSNixOS
  • cpe:2.3:a:discourse:discourse
NoYesMar 31, 2026
CVE-2026-34726MEDIUM4.4
  • PythonPython
  • copier
NoYesApr 02, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management