Security researchers from TRAPA Security and STAR Labs SG have disclosed two new critical buffer overflow vulnerabilities in Zyxel Firewall and VPN products. These vulnerabilities, tracked under the CVE IDs CVE-2023-33009 and CVE-2023-33010, are categorized as Critical in severity. They enable attackers to carry out Denial of Service and Remote Code Execution attacks on the affected Zyxel products. Given the severity of these flaws, it is crucial for users of Zyxel’s Firewall and VPN products to address these vulnerabilities promptly. In this post, we will provide a summary of the two buffer overflow vulnerabilities found in Zyxel products, list the affected products, and, most importantly, explain how to fix these two vulnerabilities: CVE-2023-33009 and CVE-2023-33010.
Zyxel Communications Corp. is a company that specializes in manufacturing networking devices. Founded in 1989 in Taiwan, Zyxel has become a leading provider of complete broadband access solutions for service providers, as well as businesses and home users.
The company produces a wide range of products in the networking field. Here are some of the main categories of Zyxel products:
Network Switches: Zyxel offers a variety of switches, including managed and unmanaged, as well as PoE (Power over Ethernet) switches. These switches can be used in various settings, from small home networks to large enterprise systems.
Routers: Zyxel produces a range of routers for both home and business use. This includes VPN routers, wireless routers, and routers with integrated modems.
Wireless Access Points: Zyxel provides a range of wireless solutions, including access points for businesses of all sizes. They also offer solutions for public WiFi networks and home use.
Network Security Appliances: Zyxel has a line of network security products, including unified security gateways and next-generation firewalls. These products offer advanced security features to protect against cyber threats.
Network Storage: Zyxel also offers network storage solutions, including Network Attached Storage (NAS) devices. These devices can be used for data backup, file sharing, and other network storage needs.
Here are the vulnerabilities found in Zyxel products.
Vendor: Zyxel
Vulnerability Type: Buffer Overflow Vulnerability
Base Score: 9.8 Critical
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
This is a Buffer Overflow vulnerability lice in ID Processing Functionof Zyxel Firewalls. A specific group of firewall versions has been found to contain a buffer overflow vulnerability within the notification function. If left unpatched, this security flaw could enable unauthenticated attackers to exploit the vulnerability, leading to potential DoS conditions and even remote code execution on affected devices.
Vendor: Zyxel
Vulnerability Type: Buffer Overflow Vulnerability
Base Score: 9.8 Critical
Vector:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
This is a Buffer Overflow vulnerability lice in notification function of Zyxel Firewalls. Another vulnerability affecting certain firewall versions has been discovered in the ID processing function. Similar to the previous vulnerability, unauthenticated attackers can leverage this buffer overflow vulnerability to cause DoS conditions and potentially execute remote code on vulnerable devices.
As per the security advisory published by Zyxel, multiple products and versions are affected by these vulnerabilities.
Affected series | Affected version |
---|---|
ATP | ZLD V4.32 to V5.36 Patch 1 |
USG FLEX | ZLD V4.50 to V5.36 Patch 1 |
USG FLEX50(W) / USG20(W)-VPN | ZLD V4.25 to V5.36 Patch 1 |
VPN | ZLD V4.30 to V5.36 Patch 1 |
ZyWALL/USG | ZLD V4.25 to V4.73 Patch 1 |
In a continuous effort to enhance cybersecurity, Zyxel has taken swift action to address multiple buffer overflow vulnerabilities affecting their firewalls. These vulnerabilities pose significant risks, including the potential for denial-of-service (DoS) attacks and remote code execution. To ensure the optimal protection of your network, it is imperative to promptly install the provided patches.
The table below provides an overview of the affected series, their corresponding affected versions, and the availability of patches to mitigate the vulnerabilities:
Affected Series | Affected Version | Patch Availability |
---|---|---|
ATP | ZLD V4.32 to V5.36 Patch 1 | ZLD V5.36 Patch 2 |
USG FLEX | ZLD V4.50 to V5.36 Patch 1 | ZLD V5.36 Patch 2 |
USG FLEX50(W) / USG20(W)-VPN | ZLD V4.25 to V5.36 Patch 1 | ZLD V5.36 Patch 2 |
VPN | ZLD V4.30 to V5.36 Patch 1 | ZLD V5.36 Patch 2 |
ZyWALL/USG | ZLD V4.25 to V4.73 Patch 1 | ZLD V4.73 Patch 2 |
It is crucial for users with firewalls from the aforementioned affected series and versions to take immediate action. By installing the provided patches, you can fix the CVE-2023-33009 and CVE-2023-33010 vulnerabilities and strengthen the security of your network.
Ensuring the security and resilience of your network is of paramount importance. Zyxel has released patches to address buffer overflow vulnerabilities in Zyxel products, potentially resulting in DoS conditions and remote code execution. By installing the available patches for the affected series and versions, you can safeguard your network from potential exploitation by unauthenticated attackers.
We hope this post helps you know how to fix CVE-2023-33009 and CVE-2023-33010, Critical Buffer Overflow Vulnerabilities in Zyxel products. Please share this post if you find this interested. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive updates like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.