Zywall USG FLEX Series & ATP Series - V5.39Patch 0 Firmware Release

Zyxel_Melen
Zyxel_Melen Posts: 2,098  Zyxel Employee
250 Answers Zyxel Certified Network Engineer Level 1 - Switch Third Anniversary 1000 Comments

Zywall USG FLEX Series & ATP Series Release Note 

September 2024

Firmware Version on all models

(Click the hyperlink to find the firmware file directly)

FLEX SeriesDownload linkATP SeriesDownload link
FLEX50V5.39(ABAQ.0)C0ATP100V5.39(ABPS.0)C0
FLEX50WV5.39(ABAR.0)C0ATP100WV5.39(ABRW.0)C0
FLEX50AXV5.39(ACGB.0)C0ATP200V5.39(ABFW.0)C0
FLEX100V5.39(ABUH.0)C0ATP500V5.39(ABFU.0)C0
FLEX100WV5.39(ABWC.0)C0ATP700V5.39(ABTJ.0)C0
FLEX100AXV5.39(ACFN.0)C0ATP800V5.39(ABIQ.0)C0
FLEX200V5.39(ABUI.0)C0
FLEX500V5.39(ABUJ.0)C0
FLEX700V5.39(ABWD.0)C0

New Feature and Enhancements

S=Standalone mode, C=Cloud mode

New Feature and Enhancements
SC
1. CLI created to enable "Drop TCP SYN packets with data".
          Router(config)# [no] malform-packet-check tcp destination-port [any | eq <1..65535>] payload-size <1..65535>

         show malform-packet-check status
         
Note: In rare cases, some TCP service may be affected after enabling "Drop TCP SYN packets with data"  feature
         
       
V-
2. Optimize URL Threat Filter/Content Filter scan flow to avoid unnecessary inspections.V-

Bug Fix

S=Standalone mode, C=Cloud mode

Bug fixSC
1. eITS#240401350, 240401693, 240501058, 240701813 a. Content Filtering is not working because TLS 1.3 Kyber support is introduced in Chrome.V-
2. eITS#240501893 a. Device becomes unresponsive after interface is disabled in device HA.V-
3. eITS#240600228 a. SSL inspection can't work within latest Chrome version.V-
4. eITS#240700190 a. Unable to backup configuration file from SecuManagerV-
5. eITS#240701292 a. Mitigation for CVE-2024-42057V-
6. eITS#240301525 a. Controller pushed VLAN settings to AP but not updated.V-
7. eITS#240400026 a. Unable to load the Station Top N page.V-
8. eITS#240400683 a. Controller pushed settings to AP issue.V-
9. eITS#240500682 a. Device unresponsive after changing MAC-filter settings.V-
10. Common vulnerabilities and Exposures: ZLD5.39 Patch0 is no longer vulnerable to the following CVE References:

-CVE-2024-3596

-CVE-2024-6343

-CVE-2024-6387

-CVE-2024-7203

-CVE-2024-42057

-CVE-2024-42058

-CVE-2024-42059

-CVE-2024-42060

-CVE-2024-42061
VV

Please refer to the Download Link for more details.

Zyxel Melen


Don't miss this great chance to upgrade your Nebula org. for free!