Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Adjacent_network
0

CVE-2023-33012

Disclosure Date: July 17, 2023
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A command injection vulnerability in the configuration parser of the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted GRE configuration when the cloud management mode is enabled.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
8.8 High
Impact Score:
5.9
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Adjacent_network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • zyxel

Products

  • usg 20w-vpn firmware,
  • usg 2200-vpn firmware,
  • usg flex 100 firmware,
  • usg flex 100w firmware,
  • usg flex 200 firmware,
  • usg flex 50 firmware,
  • usg flex 500 firmware,
  • usg flex 50w firmware,
  • usg flex 700 firmware,
  • zywall atp100 firmware,
  • zywall atp100w firmware,
  • zywall atp200 firmware,
  • zywall atp500 firmware,
  • zywall atp700 firmware,
  • zywall atp800 firmware,
  • zywall vpn 100 firmware,
  • zywall vpn 300 firmware,
  • zywall vpn 50 firmware,
  • zywall vpn100 firmware,
  • zywall vpn2s firmware,
  • zywall vpn300 firmware,
  • zywall vpn50 firmware

Additional Info

Technical Analysis