PatchSiren cyber security CVE debrief
CVE-2016-10227 Zyxel CVE debrief
CVE-2016-10227 is a network-facing denial-of-service issue affecting Zyxel USG50 and NWA3560-N firmware. According to NVD, remote attackers can trigger CPU consumption by flooding the device with ICMPv4 Port Unreachable packets. The CVE record rates the issue HIGH with a CVSS 3.0 score of 7.5, reflecting unauthenticated network exposure and availability impact only.
- Vendor
- Zyxel
- Product
- CVE-2016-10227
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-21
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-21
- Advisory updated
- 2026-05-13
Who should care
Administrators and defenders responsible for Zyxel USG50 and NWA3560-N deployments should prioritize this issue, especially where the devices sit at network edges or handle Internet-facing traffic. SOC teams and network operations staff should also watch for abnormal ICMP activity and device CPU spikes.
Technical summary
The NVD record describes a denial-of-service condition in Zyxel USG50 Security Appliance and NWA3560-N Access Point firmware. A remote attacker can send a flood of ICMPv4 Port Unreachable packets that leads to CPU consumption on the affected device. The NVD CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, and the weakness is categorized as CWE-399.
Defensive priority
High. The issue is remotely reachable, requires no privileges or user interaction, and can reduce service availability on exposed network appliances. Systems matching the listed Zyxel firmware CPEs should be reviewed promptly.
Recommended defensive actions
- Identify whether any Zyxel USG50 firmware or NWA3560-N firmware matches the vulnerable CPEs listed by NVD.
- Review the Zyxel vendor advisory referenced in the CVE record for mitigation or patch guidance.
- Limit exposure of management and security appliances to untrusted networks where possible.
- Monitor for unusual ICMPv4 Port Unreachable traffic and correlated CPU utilization spikes on affected devices.
- Validate whether the vendor has provided a firmware update or configuration workaround for your deployed model and firmware line.
Evidence notes
This debrief is based on the supplied NVD CVE record and its referenced vendor and secondary sources. The CVE was first published on 2017-02-21 and later modified on 2026-05-13 in the supplied record metadata. NVD lists vulnerable firmware CPEs for Zyxel USG50 and NWA3560-N, and the CVSS vector indicates a network-reachable availability-only denial of service. No explicit fixed-version remediation data was included in the supplied corpus.
Official resources
-
CVE-2016-10227 CVE record
CVE.org
-
CVE-2016-10227 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory
Public CVE record first published on 2017-02-21; the supplied NVD record was last modified on 2026-05-13. This debrief uses those CVE timeline fields and does not treat later generation or publication time as the vulnerability date.