First published: Mon Aug 14 2023(Updated: )
Improper frame handling in the Zyxel XGS2220-30 firmware version V4.80(ABXN.1), XMG1930-30 firmware version V4.80(ACAR.1), and XS1930-10 firmware version V4.80(ABQE.1) could allow an unauthenticated LAN-based attacker to cause denial-of-service (DoS) conditions by sending crafted frames to an affected switch.
Credit: security@zyxel.com.tw security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel XGS2220-30 firmware | =4.80\(abxn.1\) | |
Zyxel XGS2220-30 | ||
Zyxel Xgs2220-30f Firmware | =4.80\(abye.1\) | |
Zyxel Xgs2220-30f | ||
Zyxel Xgs2220-30hp Firmware | =4.80\(abxo.1\) | |
Zyxel Xgs2220-30hp | ||
Zyxel Xgs2220-54 Firmware | =4.80\(abxp.1\) | |
Zyxel Xgs2220-54 | ||
Zyxel Xgs2220-54fp Firmware | =4.80\(acce.1\) | |
Zyxel Xgs2220-54fp | ||
Zyxel Xgs2220-54hp Firmware | =4.80\(abxq.1\) | |
Zyxel Xgs2220-54hp | ||
Zyxel Xmg1930-30 Firmware | =4.80\(acar.1\) | |
Zyxel Xmg1930-30 | ||
Zyxel Xmg1930-30hp Firmware | =4.80\(acas.1\) | |
Zyxel Xmg1930-30hp | ||
Zyxel Xs1930-10 Firmware | =4.80\(abqe.1\) | |
Zyxel Xs1930-10 | ||
Zyxel Xs1930-12f Firmware | =4.80\(abzv.1\) | |
Zyxel Xs1930-12f | ||
Zyxel Xs1930-12hp Firmware | =4.80\(abqf.1\) | |
Zyxel Xs1930-12hp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-28768.
The severity of CVE-2023-28768 is 6.5 (medium).
Zyxel XGS2220-30 firmware version V4.80(ABXN.1), XMG1930-30 firmware version V4.80(ACAR.1), and XS1930-10 firmware version V4.80(ABQE.1) are affected by CVE-2023-28768.
CVE-2023-28768 could allow an unauthenticated LAN-based attacker to cause denial-of-service (DoS) conditions by sending crafted frames.
You can find more information about CVE-2023-28768 in the Zyxel Security Advisory for DoS Vulnerability of XGS2220, XMG1930, and XS1930 Series Switches.