Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-38547: Zyxel security advisory for post-authentication RCE in firewalls | Zyxel Networks

A post-authentication command injection vulnerability in the CLI command of Zyxel ZyWALL/USG series firmware versions 4.20 through 4.72, VPN series firmware versions 4.30 through 5.32, USG FLEX series firmware versions 4.50 through 5.32, and ATP series firmware versions 4.32 through 5.32, which could allow an authenticated attacker with administrator privileges to execute OS commands.

CVE
#vulnerability#rce#auth

CVE: CVE-2022-38547****Summary

Zyxel has released patches for firewalls affected by a post-authentication remote code execution (RCE) vulnerability. Users are advised to install them for optimal protection.

What is the vulnerability?

The post-authentication RCE vulnerability in the CLI command of some firewall versions could allow an authenticated attacker to execute some OS commands remotely. Note that WAN access is disabled by default on the firewall devices.

What versions are vulnerable—and what should you do?

After a thorough investigation, we’ve identified the vulnerable products that are within their vulnerability support period and released patches to address the vulnerability, as shown in the table below.

Affected series

Affected version

Patch availability

ATP

ZLD V4.32~V5.32

ZLD V5.35

USG FLEX

ZLD V4.50~V5.32

ZLD V5.35

VPN

ZLD V4.30~V5.32

ZLD V5.35

ZyWALL/USG

ZLD V4.20~V4.72

ZLD V4.73

Got a question?

Please contact your local service rep or visit Zyxel’s Community for further information or assistance.

Acknowledgment

Thanks to atdog from TRAPA Security for reporting the issue to us.

Revision history

2023-2-7: Initial release

Have a question?

We are always here to help!

Contact us

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907