The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36,  USG FLEX 50(W) series firmware versions 5.10 through 5.36, USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
History

Thu, 07 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Zyxel atp Series Firmware
Zyxel usg Flex 50\/w\/ Series Firmware
Zyxel usg Flex Series Firmware
CPEs cpe:2.3:o:zyxel:atp_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50\/w\/_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_series_firmware:*:*:*:*:*:*:*:*
Vendors & Products Zyxel atp Series Firmware
Zyxel usg Flex 50\/w\/ Series Firmware
Zyxel usg Flex Series Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zyxel

Published: 2023-07-17T16:59:45.258Z

Updated: 2024-11-07T19:14:46.971Z

Reserved: 2023-03-23T10:34:20.987Z

Link: CVE-2023-28767

cve-icon Vulnrichment

Updated: 2024-08-02T13:51:38.271Z

cve-icon NVD

Status : Modified

Published: 2023-07-17T17:15:09.883

Modified: 2024-11-21T07:55:58.100

Link: CVE-2023-28767

cve-icon Redhat

No data.