The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36,  USG FLEX 50(W) series firmware versions 5.10 through 5.36,

USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.

Project Subscriptions

Vendors Products
Atp Series Firmware Subscribe
Usg 20w-vpn Subscribe
Usg 20w-vpn Firmware Subscribe
Usg 2200-vpn Subscribe
Usg 2200-vpn Firmware Subscribe
Usg Flex 100 Subscribe
Usg Flex 100 Firmware Subscribe
Usg Flex 100w Subscribe
Usg Flex 100w Firmware Subscribe
Usg Flex 200 Subscribe
Usg Flex 200 Firmware Subscribe
Usg Flex 50 Subscribe
Usg Flex 500 Subscribe
Usg Flex 500 Firmware Subscribe
Usg Flex 50\/w\/ Series Firmware Subscribe
Usg Flex 50 Firmware Subscribe
Usg Flex 50w Subscribe
Usg Flex 50w Firmware Subscribe
Usg Flex 700 Subscribe
Usg Flex 700 Firmware Subscribe
Usg Flex Series Firmware Subscribe
Zywall Atp100 Subscribe
Zywall Atp100 Firmware Subscribe
Zywall Atp100w Subscribe
Zywall Atp100w Firmware Subscribe
Zywall Atp200 Subscribe
Zywall Atp200 Firmware Subscribe
Zywall Atp500 Subscribe
Zywall Atp500 Firmware Subscribe
Zywall Atp700 Subscribe
Zywall Atp700 Firmware Subscribe
Zywall Atp800 Subscribe
Zywall Atp800 Firmware Subscribe
Zywall Vpn100 Subscribe
Zywall Vpn100 Firmware Subscribe
Zywall Vpn2s Subscribe
Zywall Vpn2s Firmware Subscribe
Zywall Vpn300 Subscribe
Zywall Vpn300 Firmware Subscribe
Zywall Vpn50 Subscribe
Zywall Vpn50 Firmware Subscribe
Zywall Vpn 100 Subscribe
Zywall Vpn 100 Firmware Subscribe
Zywall Vpn 300 Subscribe
Zywall Vpn 300 Firmware Subscribe
Zywall Vpn 50 Subscribe
Zywall Vpn 50 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32402 The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36,  USG FLEX 50(W) series firmware versions 5.10 through 5.36, USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 07 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Zyxel atp Series Firmware
Zyxel usg Flex 50\/w\/ Series Firmware
Zyxel usg Flex Series Firmware
CPEs cpe:2.3:o:zyxel:atp_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50\/w\/_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_series_firmware:*:*:*:*:*:*:*:*
Vendors & Products Zyxel atp Series Firmware
Zyxel usg Flex 50\/w\/ Series Firmware
Zyxel usg Flex Series Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zyxel

Published:

Updated: 2024-11-07T19:14:46.971Z

Reserved: 2023-03-23T10:34:20.987Z

Link: CVE-2023-28767

cve-icon Vulnrichment

Updated: 2024-08-02T13:51:38.271Z

cve-icon NVD

Status : Modified

Published: 2023-07-17T17:15:09.883

Modified: 2024-11-21T07:55:58.100

Link: CVE-2023-28767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses