Zyxel USG < 5.36 / ATP < 5.36 / VPN < 5.36 / ZyWALL < 4.73 Patch 1 (RCE) (CVE-2023-28771)

critical Nessus Plugin ID 176216

Synopsis

The remote security gateway is affected by a remote code execution vulnerability.

Description

Firmware version of the Zyxel USG, ATP, or VPN is less than 5.36 or the version of Zyxel ZyWall is less than 4.73 Patch 1. This Zyxel device firmware contains improper error message handling logic which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Zyxel USG / ATP / VPN to 5.36 or upgrade ZyWALL < 4.73 Patch 1 or later.

See Also

http://www.nessus.org/u?3bab8fe5

Plugin Details

Severity: Critical

ID: 176216

File Name: zyxel_usg_cve-2023-28771.nasl

Version: 1.5

Type: combined

Family: Firewalls

Published: 5/22/2023

Updated: 6/12/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-28771

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:zyxel:usg_flex

Required KB Items: installed_sw/Zyxel Unified Security Gateway (USG)

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/25/2023

Vulnerability Publication Date: 4/25/2023

CISA Known Exploited Vulnerability Due Dates: 6/21/2023

Exploitable With

Metasploit (Zyxel IKE Packet Decoder Unauthenticated Remote Code Execution)

Reference Information

CVE: CVE-2023-28771