web analytics

Vulnerability Alert! Two New Exploited Flaws Discovered on Zyxel Firewalls – Source: heimdalsecurity.com

Rate this post

Source: heimdalsecurity.com – Author: Livia Gyongyoși

CISA included CVE-2023-33009 and CVE-2023-33010 Zyxel Firewalls flaws in its Known Exploited Vulnerabilities (KEV) catalog. The new CVEs could lead to a denial-of-service (DoS) condition and remote code execution.

The flaws are buffer overflow vulnerabilities and were rated 9.8 out of 10 on the CVSS scoring system. Zyxel released patches on May 24th, 2023, and urged its clients to apply them as soon as possible.

Following Devices Need Patching

Since patches for the firewalls impacted by the new buffer overflow vulnerabilities are available, users are advised to install them immediately. According to the researchers, the vulnerable firewall series are:

  • ATP (versions ZLD V4.32 to V5.36 Patch 1, patched in ZLD V5.36 Patch 2)
  • USG FLEX (versions ZLD V4.50 to V5.36 Patch 1, patched in ZLD V5.36 Patch 2)
  • USG FLEX50(W) / USG20(W)-VPN (versions ZLD V4.25 to V5.36 Patch 1, patched in ZLD V5.36 Patch 2)
  • VPN (versions ZLD V4.30 to V5.36 Patch 1, patched in ZLD V5.36 Patch 2), and
  • ZyWALL/USG (versions ZLD V4.25 to V4.73 Patch 1, patched in ZLD V4.73 Patch 2)

Source

More About the New Zyxel Vulnerabilities

According to Zyxel, if exploited, both flaws can result in denial-of-service (DoS) and remote code execution (RCE) attacks.

  • CVE-2023-33009 is a buffer overflow vulnerability residing in the notification function of some firewall versions. It could enable an unauthenticated malicious actor to cause DoS conditions and RCE.
  • CVE-2023-33010 is a buffer overflow vulnerability found in the ID processing function in some firewall versions. It can too permit an unauthenticated threat actor to create DoS conditions and RCE on a victim endpoint.

Prevention Measures Against Zyxel Firewall Vulnerabilities

The news came only days after another vulnerability, tracked CVE-2023-28771 and rated 9.8 on the CVSS scoring system, was found on Zyxel devices. On that occasion, threat actors actively exploited CVE-2023-28771 to enlist victim machines into a Mirai botnet.

Consequently, Federal Civilian Executive Branch (FCEB) agencies should remediate the flaws until June 26, 2023.

Zyxel also issued an alert last week, warning customers to disable unnecessary HTTP/HTTPS services from WAN and disable UDP ports 500 and 4500 if the use of IPSec VPN is not required.

In addition, security specialists recommend immediate patching of the Zyxel firewall vulnerabilities, in order to protect networks.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.

Heimdal Official Logo

Install and Patch Software. Close Vulnerabilities. Achieve Compliance.

Heimdal® Patch & Asset Management

Remotely and automatically install Windows, Linux and 3rd party patches and manage your software inventory.

  • Create policies that meet your exact needs;
  • Full compliance and CVE/CVSS audit trail;
  • Gain extensive vulnerability intelligence;
  • And much more than we can fit in here…

Original Post URL: https://heimdalsecurity.com/blog/zyxel-firewalls-flaws/

Category & Tags: Cybersecurity News – Cybersecurity News

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts