Lucene search

K
cve[email protected]CVE-2023-33009
HistoryMay 24, 2023 - 1:15 p.m.

CVE-2023-33009

2023-05-2413:15:09
CWE-120
web.nvd.nist.gov
325
In Wild
cve
2023
33009
buffer overflow
zyxel
atp
usg flex
firmware
vulnerability
denial of service
remote code execution

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.026 Low

EPSS

Percentile

90.3%

A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.

Affected configurations

NVD
Node
zyxelatp100Match-
AND
zyxelatp100_firmwareRange4.605.36
OR
zyxelatp100_firmwareMatch5.36-
OR
zyxelatp100_firmwareMatch5.36patch1
Node
zyxelatp200Match-
AND
zyxelatp200_firmwareRange4.605.36
OR
zyxelatp200_firmwareMatch5.36-
OR
zyxelatp200_firmwareMatch5.36patch1
Node
zyxelatp500Match-
AND
zyxelatp500_firmwareRange4.605.36
OR
zyxelatp500_firmwareMatch5.36-
OR
zyxelatp500_firmwareMatch5.36patch1
Node
zyxelatp100wMatch-
AND
zyxelatp100w_firmwareRange4.605.36
OR
zyxelatp100w_firmwareMatch5.36-
OR
zyxelatp100w_firmwareMatch5.36patch1
Node
zyxelatp700Match-
AND
zyxelatp700_firmwareRange4.605.36
OR
zyxelatp700_firmwareMatch5.36-
OR
zyxelatp700_firmwareMatch5.36patch1
Node
zyxelatp800Match-
AND
zyxelatp800_firmwareRange4.605.36
OR
zyxelatp800_firmwareMatch5.36-
OR
zyxelatp800_firmwareMatch5.36patch1
Node
zyxelusg_flex_100Match-
AND
zyxelusg_flex_100_firmwareRange4.605.36
OR
zyxelusg_flex_100_firmwareMatch5.36-
OR
zyxelusg_flex_100_firmwareMatch5.36patch1
Node
zyxelusg_flex_50Match-
AND
zyxelusg_flex_50_firmwareRange4.605.36
OR
zyxelusg_flex_50_firmwareMatch5.36-
OR
zyxelusg_flex_50_firmwareMatch5.36patch1
Node
zyxelusg_flex_200_firmwareRange4.605.36
OR
zyxelusg_flex_200_firmwareMatch5.36-
OR
zyxelusg_flex_200_firmwareMatch5.36patch1
AND
zyxelusg_flex_200Match-
Node
zyxelusg_flex_500_firmwareRange4.605.36
OR
zyxelusg_flex_500_firmwareMatch5.36-
OR
zyxelusg_flex_500_firmwareMatch5.36patch1
AND
zyxelusg_flex_500Match-
Node
zyxelusg_flex_700_firmwareRange4.605.36
OR
zyxelusg_flex_700_firmwareMatch5.36-
OR
zyxelusg_flex_700_firmwareMatch5.36patch1
AND
zyxelusg_flex_700Match-
Node
zyxelusg_flex_100_firmwareRange4.605.36
OR
zyxelusg_flex_100w_firmwareMatch5.36-
OR
zyxelusg_flex_100w_firmwareMatch5.36patch1
AND
zyxelusg_flex_100wMatch-
Node
zyxelusg_flex_50w_firmwareRange4.605.36
OR
zyxelusg_flex_50w_firmwareMatch5.36-
OR
zyxelusg_flex_50w_firmwareMatch5.36patch1
AND
zyxelusg_flex_50wMatch-
Node
zyxelusg_20w-vpn_firmwareRange4.605.36
OR
zyxelusg_20w-vpn_firmwareMatch5.36-
OR
zyxelusg_20w-vpn_firmwareMatch5.36patch1
AND
zyxelusg_20w-vpnMatch-
Node
zyxelvpn100_firmwareRange4.605.36
OR
zyxelvpn100_firmwareMatch5.36-
OR
zyxelvpn100_firmwareMatch5.36patch1
AND
zyxelvpn100Match-
Node
zyxelvpn50_firmwareRange4.605.36
OR
zyxelvpn50_firmwareMatch5.36-
OR
zyxelvpn50_firmwareMatch5.36patch1
AND
zyxelvpn50Match-
Node
zyxelvpn300_firmwareRange4.605.36
OR
zyxelvpn300_firmwareMatch5.36-
OR
zyxelvpn300_firmwareMatch5.36patch1
AND
zyxelvpn300Match-
Node
zyxelvpn1000_firmwareRange4.605.36
OR
zyxelvpn1000_firmwareMatch5.36-
OR
zyxelvpn1000_firmwareMatch5.36patch1
AND
zyxelvpn1000Match-
Node
zyxelusg20-vpn_firmwareRange4.605.36
OR
zyxelusg20-vpn_firmwareMatch5.36-
OR
zyxelusg20-vpn_firmwareMatch5.36patch1
AND
zyxelusg20-vpnMatch-
Node
zyxelusg_40_firmwareRange4.604.73
OR
zyxelusg_40_firmwareMatch4.73-
OR
zyxelusg_40_firmwareMatch4.73patch1
AND
zyxelusg_40Match-
Node
zyxelusg_40w_firmwareRange4.604.73
OR
zyxelusg_40w_firmwareMatch4.73-
OR
zyxelusg_40w_firmwareMatch4.73patch1
AND
zyxelusg_40wMatch-
Node
zyxelusg_60w_firmwareRange4.604.73
OR
zyxelusg_60w_firmwareMatch4.73-
OR
zyxelusg_60w_firmwareMatch4.73patch1
AND
zyxelusg_60wMatch-
Node
zyxelusg_60_firmwareRange4.604.73
OR
zyxelusg_60_firmwareMatch4.73-
OR
zyxelusg_60_firmwareMatch4.73patch1
AND
zyxelusg_60Match-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ATP series firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "4.60 through 5.36 Patch 1"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "USG FLEX series firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "4.60 through 5.36 Patch 1"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "USG FLEX 50(W) firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "4.60 through 5.36 Patch 1"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "USG20(W)-VPN firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "4.60 through 5.36 Patch 1"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VPN series firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "4.60 through 5.36 Patch 1"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "ZyWALL/USG series firmware",
    "vendor": "Zyxel",
    "versions": [
      {
        "status": "affected",
        "version": "4.60 through 4.73 Patch 1"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.026 Low

EPSS

Percentile

90.3%