Zyxel security advisory for DoS vulnerability of APs
CVE: CVE-2022-45854
Summary
Zyxel has released patches for access points (AP) affected by a temporary denial-of-service (DoS) vulnerability. Users are advised to install them for optimal protection.
What is the vulnerability?
An improper check for unusual conditions in some APs could allow an attacker to cause a temporary DoS by sending crafted VLAN frames if the MAC address of the vulnerable AP were known.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable products that are within their vulnerability support period and released patches to address the vulnerability, as shown in the table below.
Affected model |
Affected version |
Patch availability |
NWA110AX |
6.45(ABTG.0)C0 and earlier |
|
NWA210AX |
6.45(ABTD.0)C0 and earlier |
|
WAX510D |
6.45(ABTF.0)C0 and earlier |
|
WAX610D |
6.45(ABTE.0)C0 and earlier |
|
WAX630S |
6.45(ABZD.0)C0 and earlier |
|
WAX650S |
6.45(ABRM.0)C0 and earlier |
If an on-market product is not listed above, it is NOT affected.
Got a question?
Please contact your local service rep or visit Zyxel’s Community for further information or assistance.
Acknowledgement
Thanks to Luci Stanescu for reporting the issue to us.
Revision history
2023-2-7: Initial release
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 151 Nebula Ideas
- 98 Nebula Status and Incidents
- 5.7K Security
- 277 USG FLEX H Series
- 277 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.4K Consumer Product
- 250 Service & License
- 395 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 74 Security Highlight