First published: Mon Jul 17 2023(Updated: )
A command injection vulnerability in the Free Time WiFi hotspot feature of the Zyxel USG FLEX series firmware versions 4.50 through 5.36 Patch 2 and VPN series firmware versions 4.20 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel USG2200-VPN Firmware | >=4.20<5.37 | |
Zyxel USG2200-VPN Firmware | ||
Zyxel USG Flex 100 firmware | >=4.50<5.37 | |
Zyxel USG FLEX 100 | ||
Zyxel USG FLEX 100w firmware | >=4.50<5.37 | |
Zyxel USG FLEX 100w firmware | ||
Zyxel USG FLEX firmware | >=4.50<5.37 | |
Zyxel USG FLEX 200 firmware | ||
Zyxel USG FLEX 50(W) series firmware | >=4.50<5.37 | |
Zyxel USG FLEX 50 | ||
Zyxel USG FLEX firmware | >=4.50<5.37 | |
Zyxel USG FLEX 500 firmware | ||
Zyxel USG FLEX 50w | >=4.50<5.37 | |
Zyxel USG FLEX 50(W) series firmware | ||
Zyxel USG FLEX firmware | >=4.50<5.37 | |
Zyxel USG FLEX 700 firmware | ||
Zyxel Zywall VPN 100 | >=4.20<5.37 | |
Zyxel Zywall VPN 50 | ||
Zyxel Zywall VPN 2S | >=4.20<5.37 | |
Zyxel Zywall VPN 2S | ||
Zyxel Zywall VPN 300 Firmware | >=4.20<5.37 | |
Zyxel Zywall VPN 300 | ||
Zyxel Zywall VPN 50 Firmware | >=4.20<5.37 | |
Zyxel Zywall VPN 50 Firmware | ||
Zyxel Zywall VPN 100 | >=4.20<5.37 | |
Zyxel Zywall VPN100 | ||
Zyxel Zywall VPN300 | >=4.20<5.37 | |
Zyxel Zywall VPN300 | ||
Zyxel Zywall VPN 50 | >=4.20<5.37 | |
Zyxel Zywall VPN 50 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-34139.
The severity of CVE-2023-34139 is high.
Zyxel USG FLEX series firmware versions 4.50 through 5.36 Patch 2 and VPN series firmware versions 4.20 through 5.36 Patch 2 are affected.
An unauthenticated, LAN-based attacker can exploit CVE-2023-34139 by executing OS commands on an affected device.
Yes, users are advised to upgrade their firmware to version 5.37 or above to mitigate the vulnerability.