web analytics

Zyxel firewall and VPN devices affected by critical flaws – Source: securityaffairs.com

Rate this post

Source: securityaffairs.com – Author: Pierluigi Paganini

Zyxel fixed two critical flaws in multiple firewall and VPN products that can lead to remote code execution or cause a DoS condition.

Zyxel addressed two critical buffer overflow vulnerabilities, tracked as CVE-2023-33009 and CVE-2023-33010, that affect several of its firewall and VPN products.

A remote, unauthenticated attacker can can trigger the flaws to cause a denial-of-service (DoS) condition and remote code execution on vulnerable devices.

Below are the description for both issues provided by the vendor in a security advisory:

  • CVE-2023-33009 – A buffer overflow vulnerability in the notification function in some firewall versions could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
  • CVE-2023-33010 – A buffer overflow vulnerability in the ID processing function in some firewall versions could allow an unauthenticated attacker to cause DoS conditions and even a remote code execution on an affected device

Users are recommended to install security updates provided by the company to address the issues.

  1. CVE-2023-33009: A buffer overflow vulnerability in the notification function in some Zyxel products, allowing an unauthenticated attacker to perform remote code execution or impose DoS conditions. (critical severity score of 9.8)
  2. CVE-2023-33010: A buffer overflow vulnerability in the ID processing function in some Zyxel products, allowing an unauthenticated attacker to perform remote code execution or impose DoS conditions. (critical severity score of 9.8)

The following table includes vulnerable devices:

Affected series Affected version Patch availability
ATP ZLD V4.32 to V5.36 Patch 1 ZLD V5.36 Patch 2
USG FLEX ZLD V4.50 to V5.36 Patch 1 ZLD V5.36 Patch 2
USG FLEX50(W) / USG20(W)-VPN ZLD V4.25 to V5.36 Patch 1 ZLD V5.36 Patch 2
VPN ZLD V4.30 to V5.36 Patch 1 ZLD V5.36 Patch 2
ZyWALL/USG ZLD V4.25 to V4.73 Patch 1 ZLD V4.73 Patch 2

At the end April, Zyxel fixed a critical RCE flaw, tracked as CVE-2023-28771 (CVSS score 9.8), in its firewall devices and urged customers to install the patches.

The company also fixed a high-severity post-authentication command injection issue (CVE-2023-27991, CVSS score: 8.8) affecting some specific firewall versions.

We are in the final!

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS

Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini

Please nominate Security Affairs as your favorite blog.

Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Zyxel)




Original Post URL: https://securityaffairs.com/146660/security/zyxel-firewall-vpn-critical-flaw.html

Category & Tags: Breaking News,Security,DOS,Hacking,hacking news,information security news,IT Information Security,Pierluigi Paganini,RCE,Security Affairs,Security News,ZYXEL – Breaking News,Security,DOS,Hacking,hacking news,information security news,IT Information Security,Pierluigi Paganini,RCE,Security Affairs,Security News,ZYXEL

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts