CVE-2023-33009

A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp200_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp200_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp500_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp500_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100w_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp700_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp700_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp800_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp800_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
OR cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
OR cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn100_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
OR cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn50_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn50_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
OR cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn300_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn300_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
OR cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn1000_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn1000_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
OR cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
OR cpe:2.3:o:zyxel:usg_40_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_40:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
OR cpe:2.3:o:zyxel:usg_40w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40w_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40w_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_40w:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
OR cpe:2.3:o:zyxel:usg_60w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60w_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60w_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_60w:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
OR cpe:2.3:o:zyxel:usg_60_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_60:-:*:*:*:*:*:*:*

History

01 Apr 2024, 15:51

Type Values Removed Values Added
CPE cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*

15 Jun 2023, 07:15

Type Values Removed Values Added
Summary A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device. A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.

07 Jun 2023, 18:20

Type Values Removed Values Added
CPE cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*

06 Jun 2023, 20:05

Type Values Removed Values Added
CPE cpe:2.3:o:zyxel:atp100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn1000_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40w_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn50_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp700_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60w_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_40w:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40w_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp200_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn1000_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_60:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp500_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn300_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_40:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp800_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp700_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp200_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100w_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn300_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60w_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn50_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn100_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_60w:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp500_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp800_firmware:5.36:-:*:*:*:*:*:*
References (CONFIRM) https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls - (CONFIRM) https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls - Vendor Advisory
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

24 May 2023, 13:42

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-24 13:15

Updated : 2024-04-01 15:51


NVD link : CVE-2023-33009

Mitre link : CVE-2023-33009

CVE.ORG link : CVE-2023-33009


JSON object : View

Products Affected

zyxel

  • usg_40
  • usg_flex_200_firmware
  • usg_40w
  • atp100w_firmware
  • atp800_firmware
  • usg20-vpn
  • vpn50
  • atp700
  • atp800
  • usg_20w-vpn_firmware
  • usg_flex_50w_firmware
  • usg_flex_200
  • atp200_firmware
  • vpn300
  • atp500
  • vpn100
  • usg_60w_firmware
  • usg_60
  • vpn1000_firmware
  • atp100w
  • atp100
  • atp500_firmware
  • usg_flex_500_firmware
  • usg_flex_50
  • vpn100_firmware
  • usg_flex_100_firmware
  • vpn50_firmware
  • usg_flex_50w
  • usg_40_firmware
  • atp200
  • usg_40w_firmware
  • usg_flex_500
  • usg_flex_100
  • usg_flex_700_firmware
  • usg_flex_100w_firmware
  • vpn1000
  • usg_20w-vpn
  • usg_flex_700
  • usg_flex_100w
  • atp100_firmware
  • atp700_firmware
  • usg_60w
  • usg_60_firmware
  • vpn300_firmware
  • usg20-vpn_firmware
  • usg_flex_50_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')