CVE-2023-28767
17.07.2023, 17:15
The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions5.00 through 5.36, USG FLEX 50(W) series firmware versions 5.10 through 5.36, USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
Vendor | Product | Version |
---|---|---|
zyxel | usg_2200-vpn_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_100_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_100w_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_200_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_50_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_500_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_50w_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | usg_flex_700_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | zywall_vpn100_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | zywall_vpn2s_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | zywall_vpn300_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | zywall_vpn50_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | zywall_vpn_100_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | zywall_vpn_300_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | zywall_vpn_50_firmware | 5.00 ≤ 𝑥 < 5.37 |
zyxel | usg_20w-vpn_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | zywall_atp100_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | zywall_atp100w_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | zywall_atp200_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | zywall_atp500_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | zywall_atp700_firmware | 5.10 ≤ 𝑥 < 5.37 |
zyxel | zywall_atp800_firmware | 5.10 ≤ 𝑥 < 5.37 |
𝑥
= Vulnerable software versions
References