Zyxel Patches Critical Buffer-Overflow Vulnerabilities Affecting Firewall Devices

May 30, 2023

Zyxel Patches Critical Buffer-Overflow Vulnerabilities Affecting Firewall Devices

Zyxel has released a security advisory addressing two critical buffer-overflow vulnerabilities affecting firewall devices. The vulnerabilities are caused by buffer copy without checking size of input, which might result in remote code execution (RCE).

The Critical Vulnerabilities

  • CVE-2023-33009 (CVSS:9.8 – critical) – An unauthenticated threat actor could exploit the vulnerability in the notification function in some firewall versions to create denial-of-service (DoS) conditions and even remote code execution (RCE) on an affected device.
  • CVE-2023-33010 (CVSS:9.8 – critical) – An unauthenticated threat actor could exploit the vulnerability in the ID processing function in some firewall versions to create denial-of-service (DoS) conditions and even remote code execution (RCE) on an affected device.

Vulnerable Products

  • ATP versions ZLD V4.32 to V5.36.
  • USG FLEX versions ZLD V4.50 to V5.36.
  • VPN versions ZLD V4.30 to V5.36.
  • USG FLEX50(W) / USG20(W)-VPN ZLD V4.25 to V5.36.
  • ZyWALL/USG versions ZLD V4.25 to V4.73.

Mitigation

CYREBRO recommends to update all affected products to the latest firmware versions.

References: Zyxel Advisory

Sign Up for Updates