Zywall USG FLEX Series & ATP Series - V5.40Patch 0 Firmware Release
Options
Zyxel_Melen
Posts: 4,035
Guru Member
Guru Member
Zywall USG FLEX Series & ATP Series Release Note
May 2025
Firmware Version on all models
(Click the hyperlink to find the firmware file directly)
| FLEX Series | Download link | ATP Series | Download link |
| FLEX50 | V5.40(ABAQ.0)C0 | ATP100 | V5.40(ABPS.0)C0 |
| FLEX50W | V5.40(ABAR.0)C0 | ATP100W | V5.40(ABRW.0)C0 |
| FLEX50AX | V5.40(ACGB.0)C0 | ATP200 | V5.40(ABFW.0)C0 |
| FLEX100 | V5.40(ABUH.0)C0 | ATP500 | V5.40(ABFU.0)C0 |
| FLEX100W | V5.40(ABWC.0)C0 | ATP700 | V5.40(ABTJ.0)C0 |
| FLEX100AX | V5.40(ACFN.0)C0 | ATP800 | V5.40(ABIQ.0)C0 |
| FLEX200 | V5.40(ABUI.0)C0 | ||
| FLEX500 | V5.40(ABUJ.0)C0 | /tr> | |
| FLEX700 | V5.40(ABWD.0)C0 |
New Feature and Enhancements
S=Standalone mode, C=Cloud mode
| New Feature and Enhancements | S | C |
| 1. [eITS#240901862] Change the default value of Drop TCP SYN to 1 for better protection. | V | - |
| 2. [eITS#241100728] Add the 'system-protect defaultport' ZySH command to support user-configured ports. | V | - |
| 3. [eITS#241200805] Adjust abnormal tcp/udp traffic detected logs to debug level. | V | - |
| 4. [eITS#241200902] Disable weak ciphers in the https/ssh protocol. | V | - |
| 5. [eITS#250100793] Add i-note for base interface of PPPoE type. | V | - |
| 6. [eITS#250200278] USG FLEX 700 support expiration and notification for local user account. | V | - |
| 7. User Interface/Description change: a. Integration of the device’s local GUI pop-up warning into the Best Security Practices flow. b. Rename the signature page URL Threat Filter to 'DNS Threat Filter' and adjust the download message. | V | - |
| 8. ZLD default IPSec VPN DH group change from DH2 to DH19. | V | - |
| 9. AP Controller now supports the new WiFi 7 models: WBE530, WBE510D, and WBE630S. | V | - |
| 10. Wireless Health has been enhanced to improve the user connection experience. | V | - |
| 11. Japan 6GHz 320MHz bandwidth is now supported. | V | - |
| 12. [eITS#221201339] Add the note: 'This device is managed by Nebula. Please use the Nebula-assigned password found in Site-wide > General settings > Device configuration' on the login Web-GUI in Nebula mode. | - | V |
| 13. [eITS#241101116] DDNS password can't accept "." | - | V |
Bug Fix
S=Standalone mode, C=Cloud mode
| Bug fix | S | C |
| 1. | V | V |
| 2. Common vulnerabilities and Exposures: ZLD5.40 Patch0 is no longer vulnerable to the following CVE References: ⚫ CVE-2024-38476 | V | V |
Please refer to the Download Link for more details.
Zyxel Melen
0
Categories
- All Categories
- 439 Beta Program
- 2.8K Nebula
- 200 Nebula Ideas
- 126 Nebula Status and Incidents
- 6.3K Security
- 498 USG FLEX H Series
- 323 Security Ideas
- 1.6K Switch
- 83 Switch Ideas
- 1.3K Wireless
- 49 Wireless Ideas
- 6.8K Consumer Product
- 286 Service & License
- 457 News and Release
- 89 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.3K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 96 Security Highlight