Zyxel security advisory for multiple vulnerabilities
CVE: CVE-2023-28769, CVE-2023-28770, CVE-2022-45440
Summary
Zyxel is aware of multiple vulnerabilities reported by our security consultancy partner, SEC Consult, and advises users to install the applicable firmware updates for optimal protection.
What are the vulnerabilities?
There are eight vulnerabilities, identified as follows.
- Multiple buffer overflow vulnerabilities were discovered in the web server of the affected devices.(CVE-2023-28769)
- The CGI program lacks a proper permission control mechanism, which could allow an attacker to read sensitive files on the devices.(CVE-2023-28770)
- Insufficiently protected credentials in the configuration file of the devices could allow an attacker to retrieve the passwords.(CVE-2023-28770)
- Command injection vulnerabilities were found in the diagnostic tool and the certificate upload interface of the devices.
- Access control vulnerabilities in the devices could allow a less privileged user to access functionality of a more privileged role.
- The improper symbolic links processing vulnerability in the FTP server could allow an attacker to get read access to the root file system.(CVE-2022-45440)
- A security flaw was found in API of the devices that could be abused without authentication in order to obtain a new session key.
- A cross-site scripting vulnerability was identified in the printer name field of the print server menu within the web interface of the devices.
What versions are vulnerable-and what should you do?
After a thorough investigation, we’ve identified the affected products that are within their warranty and support period, as shown in the link here. If a product is not listed, it is not affected or has reached end-of-life. We encourage users to install the applicable updates for optimal protection.
Please note that the table in the link provided does NOT include customized models for internet service providers (ISPs).
If you are an ISP, please contact your Zyxel sales or service representative for further details.
If you are an end-user who received your Zyxel device from an ISP, please reach out to the ISP’s support team directly, as the device may have custom-built settings.
If you are an end-user who purchased your Zyxel device yourself, please contact your local Zyxel support team or visit our forum for further assistance.
Got a question?
Please contact your local service rep or visit Zyxel’s forum for further information or assistance.
Acknowledgment
Thanks to SEC Consult for reporting the issues to us.
Revision history
2022-2-15: Initial release
2023-4-28: Updated CVE IDs
Comments
-
Hello @Zyxel_Carter
Has the list of affected devices at https://www.zyxel.com/support/Zyxel-security-advisory-for-multiple-vulnerabilities_Products.shtml been taken down on purpose?
It currently says Page not Found.
Kind regards,
Tony0 -
tonygibbs16 said:Hello @Zyxel_Carter
Has the list of affected devices at https://www.zyxel.com/support/Zyxel-security-advisory-for-multiple-vulnerabilities_Products.shtml been taken down on purpose?
It currently says Page not Found.
Kind regards,
Tony0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 144 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.6K Security
- 239 USG FLEX H Series
- 267 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.3K Consumer Product
- 247 Service & License
- 384 News and Release
- 83 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.2K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight