Zyxel security advisory for DoS vulnerability of XGS2220, XMG1930, and XS1930 series switches

Options
Zyxel_May
Zyxel_May Posts: 126  Ally Member
First Anniversary First Comment

CVE: CVE-2023-28768

Summary

Zyxel has released patches for some switches affected by a denial-of-service (DoS) vulnerability. Users are advised to install them for optimal protection.

What is the vulnerability?

Improper frame handling in the Zyxel XGS2220, XMG1930, and XS1930 series switches could allow an unauthenticated LAN-based attacker to cause DoS conditions by sending crafted frames to an affected switch.

What versions are vulnerable—and what should you do?

After a thorough investigation, we’ve identified the vulnerable switches that are within their vulnerability support period and released patches to address the vulnerability, as shown in the table below.

Affected model

Affected version

Patch availability

XGS2220-30

V4.80(ABXN.1)

V4.80(ABXN.2)

XGS2220-30F

V4.80(ABYE.1)

V4.80(ABYE.2)

XGS2220-30HP

V4.80(ABXO.1)

V4.80(ABXO.2)

XGS2220-54

V4.80(ABXP.1)

V4.80(ABXP.2)

XGS2220-54FP

V4.80(ACCE.1)

V4.80(ACCE.2)

XGS2220-54HP

V4.80(ABXQ.1)

V4.80(ABXQ.2)

XMG1930-30

V4.80(ACAR.1)

V4.80(ACAR.2)

XMG1930-30HP

V4.80(ACAS.1)

V4.80(ACAS.2)

XS1930-10

V4.80(ABQE.1)

V4.80(ABQE.2)

XS1930-12F

V4.80(ABZV.1)

V4.80(ABZV.2)

XS1930-12HP

V4.80(ABQF.1)

V4.80(ABQF.2)

Got a question?

Please contact your local service rep or visit Zyxel’s Community for further information or assistance.

Revision history

2023-8-15: Initial release.