Complete News World

Zyxel closes high-risk vulnerabilities in firewalls

Zyxel closes high-risk vulnerabilities in firewalls

Zyxel warns of several vulnerabilities in firewalls and WLAN controllers. Attackers can smuggle their own commands into a device’s operating system without prior registration or triggering denial-of-service cases.


A total of seven lists of vulnerabilities Zyxel in the warning message On: Configuration parser does not appropriately filter user input (CVE-2023-28767, CVSS 8.8risk”high“), a vulnerability in profiling string handling that allows commands to be injected through tampered PPPoE configurations (CVE-2023-33011, CVSS 8.8And high) and with rigged GRE configurations this is also possible (CVE-2023-33012, CVSS 8.8And high).

Undocumented attackers can also use the free WiFi hotspot functionality to send commands to the hardware operating system from the local network (CVE-2023-34139, CVSS) 8.8And high). This is also possible through the hotspot management functionality (CVE-2023-34138, CVSS 8.0And high) and through the access point management function (CVE-2023-34141, CVSS 8.0And high). Buffer overflow when processing carefully crafted requests to the CAPWAP daemon can lead to a denial of service (CVE-2023-34140, CVSS) 6.5And middle).

Zyxel is closing the gaps with updated firmware. Version 5.37 of ZLD is available for ATP, USG Flex, USG Flex 50 (W) / USG20 (W) -VPN and VPN series firewalls. IT managers can request an urgent repair for the NXC2500 and NXC5500 WLAN Controllers. Administrators must make updates in a timely manner to reduce the attack surface.

In the past month, Zyxel has had to close critical security holes. They took care of the manufacturer’s NAS systems.


to the home page