Input Validation Flaw in Zyxel Firewall Firmware
CVE-2023-28767

8.8HIGH

Key Information:

Summary

A vulnerability exists in the configuration parser of Zyxel's firewall firmware that fails to adequately sanitize user-controlled input. This issue affects multiple firmware versions across the Zyxel ATP and USG FLEX series. An unauthenticated attacker on the local network could exploit this weakness when cloud management mode is enabled, allowing for the injection of operating system commands into the device’s configuration data, potentially compromising device integrity and security.

Affected Version(s)

ATP series firmware 5.10 through 5.36

USG FLEX 50(W) series firmware 5.10 through 5.36

USG FLEX series firmware 5.00 through 5.36

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.