Networking products maker Zyxel has unveiled patches for a critical security flaw in its firewall equipment that could be exploited to obtain distant code execution on influenced programs.
The issue, tracked as CVE-2023-28771, is rated 9.8 on the CVSS scoring program. Scientists from TRAPA Security have been credited with reporting the flaw.
“Improper error information managing in some firewall variations could permit an unauthenticated attacker to execute some OS instructions remotely by sending crafted packets to an affected gadget,” Zyxel claimed in an advisory on April 25, 2023.
Products impacted by the flaw are –
- ATP (variations ZLD V4.60 to V5.35, patched in ZLD V5.36)
- USG FLEX (versions ZLD V4.60 to V5.35, patched in ZLD V5.36)
- VPN (versions ZLD V4.60 to V5.35, patched in ZLD V5.36), and
- ZyWALL/USG (versions ZLD V4.60 to V4.73, patched in ZLD V4.73 Patch 1)
Zyxel has also resolved a high-severity submit-authentication command injection vulnerability influencing decide on firewall variations (CVE-2023-27991, CVSS score: 8.8) that could allow an authenticated attacker to execute some OS commands remotely.
The shortcoming, which impacts ATP, USG FLEX, USG FLEX 50(W) / USG20(W)-VPN, and VPN devices, has been fixed in ZLD V5.36.
Upcoming WEBINARLearn to Quit Ransomware with Actual-Time Defense
Join our webinar and learn how to end ransomware attacks in their tracks with true-time MFA and support account protection.
Save My Seat!
And finally, the enterprise also transported fixes for five high-severity flaws impacting various firewalls and obtain point (AP) units (from CVE-2023-22913 to CVE-2023-22918) that could outcome in code execution and induce a denial-of-assistance (DoS) problem.
Nikita Abramov from Russian cybersecurity company Positive Systems has been credited for reporting the issues. Abramov, before this year, also discovered four command injection and buffer overflow vulnerabilities in CPE, fiber ONTs, and WiFi extenders.
The most intense of the flaws is CVE-2022-43389 (CVSS score: 9.8), a buffer overflow vulnerability impacting 5G NR/4G LTE CPE products.
“It did not have to have authentication to be exploited and led to arbitrary code execution on the gadget,” Abramov spelled out at the time. “As a outcome, an attacker could acquire remote accessibility to the product and absolutely management its operation.”
Discovered this write-up appealing? Observe us on Twitter and LinkedIn to examine extra special articles we article.
Some parts of this article are sourced from:
thehackernews.com