First published: Mon Jul 17 2023(Updated: )
The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36, USG FLEX 50(W) series firmware versions 5.10 through 5.36, USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
Credit: security@zyxel.com.tw security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel Usg 2200-vpn Firmware | >=5.00<5.37 | |
Zyxel Usg 2200-vpn | ||
Zyxel Usg Flex 100 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 100 | ||
Zyxel Usg Flex 100w Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 100w | ||
Zyxel Usg Flex 200 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 200 | ||
Zyxel Usg Flex 50 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 50 | ||
Zyxel Usg Flex 500 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 500 | ||
Zyxel Usg Flex 50w Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 50w | ||
Zyxel Usg Flex 700 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 700 | ||
Zyxel Zywall Vpn100 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn100 | ||
Zyxel Zywall Vpn2s Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn2s | ||
Zyxel Zywall Vpn300 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn300 | ||
Zyxel Zywall Vpn50 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn50 | ||
Zyxel Zywall Vpn 100 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn 100 | ||
Zyxel Zywall Vpn 300 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn 300 | ||
Zyxel Zywall Vpn 50 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn 50 | ||
Zyxel Usg 20w-vpn Firmware | >=5.10<5.37 | |
Zyxel Usg 20w-vpn | ||
Zyxel Zywall Atp100 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp100 | ||
Zyxel Zywall Atp100w Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp100w | ||
Zyxel Zywall Atp200 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp200 | ||
Zyxel Zywall Atp500 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp500 | ||
Zyxel Zywall Atp700 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp700 | ||
Zyxel Zywall Atp800 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-28767 is high with a CVSS score of 8.8.
Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36, USG FLEX 50(W) series firmware versions 5.10 through 5.36, USG20(W)-VPN series firmware versions 5.10 through 5.36 are affected by CVE-2023-28767.
The configuration parser fails to sanitize user-controlled input in CVE-2023-28767.
The CWE for CVE-2023-28767 is CWE-78.
To fix the vulnerability in CVE-2023-28767, update the firmware of the affected Zyxel products to versions 5.37 or higher.