Heimdal
article featured image

Contents:

CISA included CVE-2023-33009 and CVE-2023-33010 Zyxel Firewalls flaws in its Known Exploited Vulnerabilities (KEV) catalog. The new CVEs could lead to a denial-of-service (DoS) condition and remote code execution.

The flaws are buffer overflow vulnerabilities and were rated 9.8 out of 10 on the CVSS scoring system. Zyxel released patches on May 24th, 2023, and urged its clients to apply them as soon as possible.

Following Devices Need Patching

Since patches for the firewalls impacted by the new buffer overflow vulnerabilities are available, users are advised to install them immediately. According to the researchers, the vulnerable firewall series are:

  • ATP (versions ZLD V4.32 to V5.36 Patch 1, patched in ZLD V5.36 Patch 2)
  • USG FLEX (versions ZLD V4.50 to V5.36 Patch 1, patched in ZLD V5.36 Patch 2)
  • USG FLEX50(W) / USG20(W)-VPN (versions ZLD V4.25 to V5.36 Patch 1, patched in ZLD V5.36 Patch 2)
  • VPN (versions ZLD V4.30 to V5.36 Patch 1, patched in ZLD V5.36 Patch 2), and
  • ZyWALL/USG (versions ZLD V4.25 to V4.73 Patch 1, patched in ZLD V4.73 Patch 2)

Source

More About the New Zyxel Vulnerabilities

According to Zyxel, if exploited, both flaws can result in denial-of-service (DoS) and remote code execution (RCE) attacks.

  • CVE-2023-33009 is a buffer overflow vulnerability residing in the notification function of some firewall versions. It could enable an unauthenticated malicious actor to cause DoS conditions and RCE.
  • CVE-2023-33010 is a buffer overflow vulnerability found in the ID processing function in some firewall versions. It can too permit an unauthenticated threat actor to create DoS conditions and RCE on a victim endpoint.

Prevention Measures Against Zyxel Firewall Vulnerabilities

The news came only days after another vulnerability, tracked CVE-2023-28771 and rated 9.8 on the CVSS scoring system, was found on Zyxel devices. On that occasion, threat actors actively exploited CVE-2023-28771 to enlist victim machines into a Mirai botnet.

Consequently, Federal Civilian Executive Branch (FCEB) agencies should remediate the flaws until June 26, 2023.

Zyxel also issued an alert last week, warning customers to disable unnecessary HTTP/HTTPS services from WAN and disable UDP ports 500 and 4500 if the use of IPSec VPN is not required.

In addition, security specialists recommend immediate patching of the Zyxel firewall vulnerabilities, in order to protect networks.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.

Heimdal Official Logo
Install and Patch Software. Close Vulnerabilities. Achieve Compliance.

Heimdal® Patch & Asset Management

Remotely and automatically install Windows, Linux and 3rd party patches and manage your software inventory.
  • Create policies that meet your exact needs;
  • Full compliance and CVE/CVSS audit trail;
  • Gain extensive vulnerability intelligence;
  • And much more than we can fit in here...
Try it for FREE today 30-day Free Trial. Offer valid only for companies.
Author Profile

Livia Gyongyoși

Communications and PR Officer

Livia Gyongyoși is a Communications and PR Officer within Heimdal®, passionate about cybersecurity. Always interested in being up to date with the latest news regarding this domain, Livia's goal is to keep others informed about best practices and solutions that help avoid cyberattacks.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE