First published: Mon Jul 17 2023(Updated: )
A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.36 Patch 2, USG FLEX series firmware versions 4.50 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.16 through 5.36 Patch 2, VPN series firmware versions 4.30 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to cause denial of service (DoS) conditions by sending a crafted request to the CAPWAP daemon.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel USG 20W-VPN Firmware | >=4.16<5.37 | |
Zyxel USG20 | ||
Zyxel USG2200-VPN Firmware | >=4.30<5.37 | |
Zyxel USG2200-VPN Firmware | ||
Zyxel USG Flex 100 firmware | >=4.50<5.37 | |
Zyxel USG Flex 100 firmware | ||
Zyxel USG FLEX 100w firmware | >=4.50<5.37 | |
Zyxel USG FLEX 100w firmware | ||
Zyxel USG FLEX firmware | >=4.50<5.37 | |
Zyxel USG FLEX 200 firmware | ||
Zyxel USG FLEX 50(W) series firmware | >=4.50<5.37 | |
Zyxel USG FLEX 50w | ||
Zyxel USG FLEX firmware | >=4.50<5.37 | |
Zyxel USG FLEX 500 firmware | ||
Zyxel USG FLEX 50w | >=4.50<5.37 | |
Zyxel USG FLEX 50(W) series firmware | ||
Zyxel USG FLEX firmware | >=4.50<5.37 | |
Zyxel USG FLEX 700 firmware | ||
Zyxel Zywall ATP100W Firmware | >=4.32<5.37 | |
Zyxel ZyWall ATP100 Firmware | ||
Zyxel ATP100W Firmware | >=4.32<5.37 | |
Zyxel Zywall ATP100W Firmware | ||
Zyxel Zywall ATP200 | >=4.32<5.37 | |
Zyxel Zywall ATP200 | ||
Zyxel ATP500 Firmware | >=4.32<5.37 | |
Zyxel ATP500 Firmware | ||
Zyxel ATP700 Firmware | >=4.32<5.37 | |
Zyxel ATP700 Firmware | ||
Zyxel ATP800 | >=4.32<5.37 | |
Zyxel Zywall ATP800 Firmware | ||
Zyxel Zywall VPN 100 | >=4.30<5.37 | |
Zyxel Zywall VPN 100 | ||
Zyxel Zywall VPN 2S | >=4.30<5.37 | |
Zyxel Zywall VPN 2S | ||
Zyxel Zywall VPN 300 Firmware | >=4.30<5.37 | |
Zyxel Zywall VPN 300 | ||
Zyxel Zywall VPN 50 Firmware | >=4.30<5.37 | |
Zyxel Zywall VPN 50 Firmware | ||
Zyxel Zywall VPN 100 | >=4.30<5.37 | |
Zyxel VPN100 | ||
Zyxel Zywall VPN300 | >=4.30<5.37 | |
Zyxel Zywall VPN300 | ||
Zyxel VPN50 Firmware | >=4.30<5.37 | |
Zyxel VPN50 | ||
Zyxel NXC2500 firmware | >=6.10\(aaig.0\)<=6.10\(aaig.3\) | |
Zyxel NXC2500 firmware | ||
Zyxel NXC5500 | >=6.10\(aaos.0\)<=6.10\(aaos.4\) | |
Zyxel NXC5500 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34140 is medium with a score of 6.5.
Zyxel ATP series firmware versions 4.32 through 5.36 Patch 2, USG FLEX series firmware versions 4.50 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 through 5.36 Patch 2, and USG20(W)-VPN series firmware versions 4.16 through 5.36 Patch 2 are affected by CVE-2023-34140.
To fix CVE-2023-34140, update your Zyxel firmware to versions 5.37 for affected models.
The Common Vulnerabilities and Exposures (CVE) ID of this vulnerability is CVE-2023-34140.