CVE-2023-33010

A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ZyxelCNA
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 91%
VendorProductVersion
zyxelatp100_firmware
4.32 ≤
𝑥
< 5.36
zyxelatp100_firmware
5.36
zyxelatp100_firmware
5.36:patch1
zyxelatp200_firmware
4.32 ≤
𝑥
< 5.36
zyxelatp200_firmware
5.36
zyxelatp200_firmware
5.36:patch1
zyxelatp500_firmware
4.32 ≤
𝑥
< 5.36
zyxelatp500_firmware
5.36
zyxelatp500_firmware
5.36:patch1
zyxelatp100w_firmware
4.32 ≤
𝑥
< 5.36
zyxelatp100w_firmware
5.36
zyxelatp100w_firmware
5.36:patch1
zyxelatp700_firmware
4.32 ≤
𝑥
< 5.36
zyxelatp700_firmware
5.36
zyxelatp700_firmware
5.36:patch1
zyxelatp800_firmware
4.32 ≤
𝑥
< 5.36
zyxelatp800_firmware
5.36
zyxelatp800_firmware
5.36:patch1
zyxelusg_flex_100_firmware
4.50 ≤
𝑥
< 5.36
zyxelusg_flex_100_firmware
5.36
zyxelusg_flex_100_firmware
5.36:patch1
zyxelusg_flex_50_firmware
5.36
zyxelusg_flex_50_firmware
5.36:patch1
zyxelusg_flex_200_firmware
4.50 ≤
𝑥
< 5.36
zyxelusg_flex_200_firmware
5.36
zyxelusg_flex_200_firmware
5.36:patch1
zyxelusg_flex_500_firmware
4.50 ≤
𝑥
< 5.36
zyxelusg_flex_500_firmware
5.36
zyxelusg_flex_500_firmware
5.36:patch1
zyxelusg_flex_700_firmware
4.50 ≤
𝑥
< 5.36
zyxelusg_flex_700_firmware
5.36
zyxelusg_flex_700_firmware
5.36:patch1
zyxelusg_flex_100_firmware
4.50 ≤
𝑥
< 5.36
zyxelusg_flex_100w_firmware
5.36
zyxelusg_flex_100w_firmware
5.36:patch1
zyxelusg_flex_50w_firmware
4.25 ≤
𝑥
< 5.36
zyxelusg_flex_50w_firmware
5.36
zyxelusg_flex_50w_firmware
5.36:patch1
zyxelusg_20w-vpn_firmware
5.36
zyxelusg_20w-vpn_firmware
5.36:patch1
zyxelvpn100_firmware
4.30 ≤
𝑥
< 5.36
zyxelvpn100_firmware
5.36
zyxelvpn100_firmware
5.36:patch1
zyxelvpn50_firmware
4.30 ≤
𝑥
< 5.36
zyxelvpn50_firmware
5.36
zyxelvpn50_firmware
5.36:patch1
zyxelvpn300_firmware
4.30 ≤
𝑥
< 5.36
zyxelvpn300_firmware
5.36
zyxelvpn300_firmware
5.36:patch1
zyxelvpn1000_firmware
4.30 ≤
𝑥
< 5.36
zyxelvpn1000_firmware
5.36
zyxelvpn1000_firmware
5.36:patch1
zyxelusg20-vpn_firmware
4.30 ≤
𝑥
< 5.36
zyxelusg20-vpn_firmware
5.36
zyxelusg20-vpn_firmware
5.36:patch1
zyxelusg_40_firmware
4.25 ≤
𝑥
< 4.73
zyxelusg_40_firmware
4.73
zyxelusg_40_firmware
4.73:patch1
zyxelusg_40w_firmware
4.25 ≤
𝑥
< 4.73
zyxelusg_40w_firmware
4.73
zyxelusg_40w_firmware
4.73:patch1
zyxelusg_60w_firmware
4.25 ≤
𝑥
< 4.73
zyxelusg_60w_firmware
4.73
zyxelusg_60w_firmware
4.73:patch1
zyxelusg_60_firmware
4.25 ≤
𝑥
< 4.73
zyxelusg_60_firmware
4.73
zyxelusg_60_firmware
4.73:patch1
𝑥
= Vulnerable software versions