8.8

CVE-2023-28767

The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36,  USG FLEX 50(W) series firmware versions 5.10 through 5.36, 

USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.

Data is provided by the National Vulnerability Database (NVD)
ZyxelUsg 2200-vpn Firmware Version >= 5.00 < 5.37
   ZyxelUsg 2200-vpn Version-
ZyxelUsg Flex 100 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 100 Version-
ZyxelUsg Flex 100w Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 100w Version-
ZyxelUsg Flex 200 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 200 Version-
ZyxelUsg Flex 50 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 50 Version-
ZyxelUsg Flex 500 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 500 Version-
ZyxelUsg Flex 50w Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 50w Version-
ZyxelUsg Flex 700 Firmware Version >= 5.00 < 5.37
   ZyxelUsg Flex 700 Version-
ZyxelZywall Vpn100 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn100 Version-
ZyxelZywall Vpn2s Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn2s Version-
ZyxelZywall Vpn300 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn300 Version-
ZyxelZywall Vpn50 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn50 Version-
ZyxelZywall Vpn 100 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn 100 Version-
ZyxelZywall Vpn 300 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn 300 Version-
ZyxelZywall Vpn 50 Firmware Version >= 5.00 < 5.37
   ZyxelZywall Vpn 50 Version-
ZyxelUsg 20w-vpn Firmware Version >= 5.10 < 5.37
   ZyxelUsg 20w-vpn Version-
ZyxelZywall Atp100 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp100 Version-
ZyxelZywall Atp100w Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp100w Version-
ZyxelZywall Atp200 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp200 Version-
ZyxelZywall Atp500 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp500 Version-
ZyxelZywall Atp700 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp700 Version-
ZyxelZywall Atp800 Firmware Version >= 5.10 < 5.37
   ZyxelZywall Atp800 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.12% 0.329
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security@zyxel.com.tw 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.