Zyxel addressed two critical buffer overflow vulnerabilities, tracked as CVE-2023-33009 and CVE-2023-33010, that affect several of its firewall and VPN products.
A remote, unauthenticated attacker can can trigger the flaws to cause a denial-of-service (DoS) condition and remote code execution on vulnerable devices.
Below are the description for both issues provided by the vendor in a security advisory:
Users are recommended to install security updates provided by the company to address the issues.
The following table includes vulnerable devices:
|Affected series||Affected version||Patch availability|
|ATP||ZLD V4.32 to V5.36 Patch 1||ZLD V5.36 Patch 2|
|USG FLEX||ZLD V4.50 to V5.36 Patch 1||ZLD V5.36 Patch 2|
|USG FLEX50(W) / USG20(W)-VPN||ZLD V4.25 to V5.36 Patch 1||ZLD V5.36 Patch 2|
|VPN||ZLD V4.30 to V5.36 Patch 1||ZLD V5.36 Patch 2|
|ZyWALL/USG||ZLD V4.25 to V4.73 Patch 1||ZLD V4.73 Patch 2|
At the end April, Zyxel fixed a critical RCE flaw, tracked as CVE-2023-28771 (CVSS score 9.8), in its firewall devices and urged customers to install the patches.
The company also fixed a high-severity post-authentication command injection issue (CVE-2023-27991, CVSS score: 8.8) affecting some specific firewall versions.
We are in the final!
Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini
Please nominate Security Affairs as your favorite blog.
Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Zyxel)