Attacker Value
Unknown
(1 user assessed)
Exploitability
Unknown
(1 user assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
1

CVE-2023-33010

Disclosure Date: May 24, 2023
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Initial Access
Techniques
Validation
Validated

Description

A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.

Add Assessment

2
Ratings
Technical Analysis

A July 2024 bulletin from multiple U.S. government agencies indicates that North Korean state-sponsored attackers have demonstrated interest in this vulnerability — not immediately clear whether it was exploited or just used in reconnaissance/target selection: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a

CVSS V3 Severity and Metrics
Base Score:
9.8 Critical
Impact Score:
5.9
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • zyxel

Products

  • atp100 firmware,
  • atp100 firmware 5.36,
  • atp100w firmware,
  • atp100w firmware 5.36,
  • atp200 firmware,
  • atp200 firmware 5.36,
  • atp500 firmware,
  • atp500 firmware 5.36,
  • atp700 firmware,
  • atp700 firmware 5.36,
  • atp800 firmware,
  • atp800 firmware 5.36,
  • usg 20w-vpn firmware 5.36,
  • usg 40 firmware,
  • usg 40 firmware 4.73,
  • usg 40w firmware,
  • usg 40w firmware 4.73,
  • usg 60 firmware,
  • usg 60 firmware 4.73,
  • usg 60w firmware,
  • usg 60w firmware 4.73,
  • usg flex 100 firmware,
  • usg flex 100 firmware 5.36,
  • usg flex 100w firmware 5.36,
  • usg flex 200 firmware,
  • usg flex 200 firmware 5.36,
  • usg flex 50 firmware 5.36,
  • usg flex 500 firmware,
  • usg flex 500 firmware 5.36,
  • usg flex 50w firmware,
  • usg flex 50w firmware 5.36,
  • usg flex 700 firmware,
  • usg flex 700 firmware 5.36,
  • usg20-vpn firmware,
  • usg20-vpn firmware 5.36,
  • vpn100 firmware,
  • vpn100 firmware 5.36,
  • vpn1000 firmware,
  • vpn1000 firmware 5.36,
  • vpn300 firmware,
  • vpn300 firmware 5.36,
  • vpn50 firmware,
  • vpn50 firmware 5.36

Exploited in the Wild

Reported by:

Additional Info

Technical Analysis