First published: Mon Jul 17 2023(Updated: )
A command injection vulnerability in the configuration parser of the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted GRE configuration when the cloud management mode is enabled.
Credit: security@zyxel.com.tw security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel Usg 20w-vpn Firmware | >=5.10<5.37 | |
Zyxel Usg 20w-vpn | ||
Zyxel Usg 2200-vpn Firmware | >=5.00<5.37 | |
Zyxel Usg 2200-vpn | ||
Zyxel Usg Flex 100 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 100 | ||
Zyxel Usg Flex 100w Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 100w | ||
Zyxel Usg Flex 200 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 200 | ||
Zyxel Usg Flex 50 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 50 | ||
Zyxel Usg Flex 500 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 500 | ||
Zyxel Usg Flex 50w Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 50w | ||
Zyxel Usg Flex 700 Firmware | >=5.00<5.37 | |
Zyxel Usg Flex 700 | ||
Zyxel Zywall Atp100 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp100 | ||
Zyxel Zywall Atp100w Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp100w | ||
Zyxel Zywall Atp200 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp200 | ||
Zyxel Zywall Atp500 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp500 | ||
Zyxel Zywall Atp700 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp700 | ||
Zyxel Zywall Atp800 Firmware | >=5.10<5.37 | |
Zyxel Zywall Atp800 | ||
Zyxel Zywall Vpn100 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn100 | ||
Zyxel Zywall Vpn2s Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn2s | ||
Zyxel Zywall Vpn300 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn300 | ||
Zyxel Zywall Vpn50 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn50 | ||
Zyxel Zywall Vpn 100 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn 100 | ||
Zyxel Zywall Vpn 300 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn 300 | ||
Zyxel Zywall Vpn 50 Firmware | >=5.00<5.37 | |
Zyxel Zywall Vpn 50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33012 is a command injection vulnerability in the configuration parser of the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2.
Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, and USG20(W)-VPN series firmware versions 5.00 through 5.37 are affected by CVE-2023-33012.
CVE-2023-33012 has a severity rating of 8.8 (high).
To fix CVE-2023-33012, update the firmware of affected Zyxel products to versions 5.37 or later.
You can find more information about CVE-2023-33012 in the Zyxel Security Advisory for Multiple Vulnerabilities in Firewalls and WLAN Controllers.