Zyxel security advisory for XSS vulnerability in firewalls
CVE: CVE-2022-40603
Summary
Zyxel has released patches for some firewalls affected by a reflected cross-site scripting (XSS) vulnerability. Users are advised to install them for optimal protection.
What is the vulnerability?
A reflected XSS vulnerability in the CGI program of some firewall versions could allow an attacker to trick a user into visiting a crafted URL with the XSS payload. The attacker could gain access to sensitive browser-based information if the malicious script is executed on the victim’s browser.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable products that are within their vulnerability support period and released patches to address the vulnerability, as shown in the table below.
Affected series |
Affected version |
Patch availability |
ATP |
ZLD V4.32~V5.31 |
ZLD V5.32 |
USG FLEX |
ZLD V4.50~V5.31 |
ZLD V5.32 |
VPN |
ZLD V4.30~V5.31 |
ZLD V5.32 |
ZyWALL/USG |
ZLD V4.30~V4.72 |
ZLD V4.73 |
Got a question?
Please contact your local service rep or visit Zyxel’s Community for further information or assistance.
Acknowledgement
Thanks to Alessandro Sgreccia from Tecnical Service SRL for reporting the issue to us.
Revision histor
2022-12-06: Initial release
Categories
- All Categories
- 415 Beta Program
- 2.3K Nebula
- 141 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.5K Security
- 216 USG FLEX H Series
- 262 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1K Wireless
- 39 Wireless Ideas
- 6.3K Consumer Product
- 243 Service & License
- 382 News and Release
- 81 Security Advisories
- 27 Education Center
- 8 [Campaign] Zyxel Network Detective
- 3K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight