Zyxel security advisory for improper privilege management vulnerability in GS1900 series switches

Options
Zyxel_May
Zyxel_May Posts: 128  Ally Member
First Anniversary First Comment
edited November 2023 in Security Advisories

CVE: CVE-2023-35140

Summary

Zyxel has released patches for GS1900 series switches affected by an improper privilege management vulnerability. Users are advised to install them for optimal protection.

What is the vulnerability?

A vulnerability in the Zyxel GS1900 series switches could allow a local authenticated user with the read-only access to modify system settings on a vulnerable device.

What versions are vulnerable—and what should you do?

After a thorough investigation, we’ve identified the vulnerable switches that are within their vulnerability support period and released patches to address the vulnerability, as shown in the table below.

Affected model

Affected version

Patch availability

GS1900-8

V2.70(AAHH.5)

V2.80(AAHH.0)

GS1900-8HP

V2.70(AAHI.5)

V2.80(AAHI.0)

GS1900-10HP

V2.70(AAZI.5)

V2.80(AAZI.0)

GS1900-16

V2.70(AAHJ.5)

V2.80(AAHJ.0)

GS1900-24

V2.70(AAHL.5)

V2.80(AAHL.0)

GS1900-24E

V2.70(AAHK.5)

V2.80(AAHK.0)

GS1900-24EP

V2.70(ABTO.5)

V2.80(ABTO.0)

GS1900-24HPv2

V2.70(ABTP.5)

V2.80(ABTP.0)

GS1900-48

V2.70(AAHN.5)

V2.80(AAHN.0)

GS1900-48HPv2

V2.70(ABTQ.5)

V2.80(ABTQ.0)

Got a question?

Please contact your local service rep or visit Zyxel’s Community for further information or assistance.

Acknowledgment

Thanks to Alexey Morozkov for reporting the issue to us.

Revision history

2023-11-7: Initial release.