FKIE_CVE-2023-33010

Vulnerability from fkie_nvd - Published: 2023-05-24 13:15 - Updated: 2025-10-27 17:04
Summary
A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
Impacted products
Vendor Product Version
zyxel atp100_firmware *
zyxel atp100_firmware 5.36
zyxel atp100_firmware 5.36
zyxel atp100 -
zyxel atp200_firmware *
zyxel atp200_firmware 5.36
zyxel atp200_firmware 5.36
zyxel atp200 -
zyxel atp500_firmware *
zyxel atp500_firmware 5.36
zyxel atp500_firmware 5.36
zyxel atp500 -
zyxel atp100w_firmware *
zyxel atp100w_firmware 5.36
zyxel atp100w_firmware 5.36
zyxel atp100w -
zyxel atp700_firmware *
zyxel atp700_firmware 5.36
zyxel atp700_firmware 5.36
zyxel atp700 -
zyxel atp800_firmware *
zyxel atp800_firmware 5.36
zyxel atp800_firmware 5.36
zyxel atp800 -
zyxel usg_flex_100_firmware *
zyxel usg_flex_100_firmware 5.36
zyxel usg_flex_100_firmware 5.36
zyxel usg_flex_100 -
zyxel usg_flex_50_firmware 5.36
zyxel usg_flex_50_firmware 5.36
zyxel usg_flex_50 -
zyxel usg_flex_200_firmware *
zyxel usg_flex_200_firmware 5.36
zyxel usg_flex_200_firmware 5.36
zyxel usg_flex_200 -
zyxel usg_flex_500_firmware *
zyxel usg_flex_500_firmware 5.36
zyxel usg_flex_500_firmware 5.36
zyxel usg_flex_500 -
zyxel usg_flex_700_firmware *
zyxel usg_flex_700_firmware 5.36
zyxel usg_flex_700_firmware 5.36
zyxel usg_flex_700 -
zyxel usg_flex_100_firmware *
zyxel usg_flex_100w_firmware 5.36
zyxel usg_flex_100w_firmware 5.36
zyxel usg_flex_100w -
zyxel usg_flex_50w_firmware *
zyxel usg_flex_50w_firmware 5.36
zyxel usg_flex_50w_firmware 5.36
zyxel usg_flex_50w -
zyxel usg_20w-vpn_firmware 5.36
zyxel usg_20w-vpn_firmware 5.36
zyxel usg_20w-vpn -
zyxel vpn100_firmware *
zyxel vpn100_firmware 5.36
zyxel vpn100_firmware 5.36
zyxel vpn100 -
zyxel vpn50_firmware *
zyxel vpn50_firmware 5.36
zyxel vpn50_firmware 5.36
zyxel vpn50 -
zyxel vpn300_firmware *
zyxel vpn300_firmware 5.36
zyxel vpn300_firmware 5.36
zyxel vpn300 -
zyxel vpn1000_firmware *
zyxel vpn1000_firmware 5.36
zyxel vpn1000_firmware 5.36
zyxel vpn1000 -
zyxel usg20-vpn_firmware *
zyxel usg20-vpn_firmware 5.36
zyxel usg20-vpn_firmware 5.36
zyxel usg20-vpn -
zyxel usg_40_firmware *
zyxel usg_40_firmware 4.73
zyxel usg_40_firmware 4.73
zyxel usg_40 -
zyxel usg_40w_firmware *
zyxel usg_40w_firmware 4.73
zyxel usg_40w_firmware 4.73
zyxel usg_40w -
zyxel usg_60w_firmware *
zyxel usg_60w_firmware 4.73
zyxel usg_60w_firmware 4.73
zyxel usg_60w -
zyxel usg_60_firmware *
zyxel usg_60_firmware 4.73
zyxel usg_60_firmware 4.73
zyxel usg_60 -

{
  "cisaActionDue": "2023-06-26",
  "cisaExploitAdd": "2023-06-05",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Zyxel Multiple Firewalls Buffer Overflow Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E39B94-291E-4E3A-8A89-B74FF063BA05",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp100_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "C5813B69-C1A3-4695-8B63-17994BBA1723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp100_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "B61DE8A9-6A73-45EF-8C37-39138F39168A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F7654A1-3806-41C7-82D4-46B0CD7EE53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A41F09-4474-4ABC-B2FA-92B17F63A7CA",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp200_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "49FF3D01-C9AA-452C-A079-3180DC8DB269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp200_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "8ABED29D-8074-46AB-8A0F-759B0653691B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68A36FF-8CAF-401C-9F18-94F3A2405CF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B7E5F75-5577-4511-A1F4-1BD142D60BD5",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp500_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "9801F3AB-4560-44AA-934F-0A6D31F46195",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp500_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "2A0E5B17-00E0-4CB0-9787-D6A8C8E1E0BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2818E8AC-FFEE-4DF9-BF3F-C75166C0E851",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8F79940-F737-4A71-9FAC-1F99E0BCE450",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp100w_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "3CBAF763-195F-4B36-A450-719931B86650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp100w_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "4CB974EC-859A-4B74-8A60-98A5406E8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47398FD0-6C5E-4625-9EFD-DE08C9AB7DB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7728D2C4-0B0A-404E-92BC-AAA1A1987BFD",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp700_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "F4CF847A-A858-43A6-B35B-91455682E382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp700_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "9BE980D6-9D39-41B9-A35C-1879B72F4146",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B41F437-855B-4490-8011-DF59887BE6D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "791D6928-BE82-4678-A8A4-39C9D9A1C684",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp800_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "BA1C872C-9192-410D-86F1-55CDF07DE77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:atp800_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "EECC0FB9-DED8-4ACF-A627-0537F3EE8C65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B99746-0589-46E6-9CBD-F38619AD97DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC95F84E-95A0-4FB8-942A-732E022E3CC6",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "DA9E3C5E-9447-40D2-9036-6097FF433433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "12F0F5D8-AC3F-4485-A013-5109FB796FF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B30A4C0-9928-46AD-9210-C25656FB43FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "EF66A8A2-EE45-43ED-8F5A-FF488AC39943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "F185DD94-DDA0-4B37-BADE-8468BA08CC02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "646C1F07-B553-47B0-953B-DC7DE7FD0F8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65ACDFE-3A54-46D6-98CA-2D51957072AF",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "23E7810E-370E-4405-B7A2-C988511BE7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "8571FFB9-A90D-4EBD-87C0-F5119D142CEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F93B6A06-2951-46D2-A7E1-103D7318D612",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B8FF81-5020-429E-ABC7-D0F18A5177F5",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "46E17CE0-8EA7-4188-B3E7-DBD1D30C8DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "C3D2B551-E080-4F75-A0C7-30D9E684EEEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C697A5-D1D3-4FF0-9C43-D27B18181958",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD0F817C-6388-41E2-9F80-9B5427036865",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "9A4E9538-EFB8-4181-A48B-D9B09F124B4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "9ECBAE12-DD16-476C-A2F1-2DF5F334741D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D1396E3-731B-4D05-A3F8-F3ABB80D5C29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC95F84E-95A0-4FB8-942A-732E022E3CC6",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "6ED353C3-7BD1-4270-8D70-0B3D51C276E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "AEA17444-10FA-4B93-A2D3-5D00151C12C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74ABA7E-AA78-4A13-A64E-C44021591B42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0751B297-FB9F-4F44-BF19-1C7668B8B757",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "206BCF6E-CEB7-4972-B321-ED3CAFD92E76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "18F99AF2-8419-4ADC-9F46-D53C177BA50F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "110A1CA4-0170-4834-8281-0A3E14FC5584",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "107BB5B9-9C04-4C35-88AD-4D59ECD17778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "5776089E-F9F4-4A0E-A169-FA1FC4DC6329",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEA412F-3DA1-4E91-9C74-0666147DABCE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB329984-D2A1-40B4-826D-78643B8DD4C8",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:vpn100_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "B5FD9479-4FF2-412C-AB26-5F46FB354653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:vpn100_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "499EA838-5310-4C1C-B9E7-2AB90ACEAA2E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D90A7B-174F-40A1-8AF4-08B15B7BAC40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01FA34A-CA33-48E7-978C-638FC678C9C1",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:vpn50_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "A7C9CFAA-87BB-4FFE-9191-0A662E58A2F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:vpn50_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "062596D1-4466-46B6-B6B6-4403675B6A3B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3AC823-0ECA-42D8-8312-2FBE5914E4C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0135FFF-62FA-4AEA-8B67-1CCA2D85D8E0",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:vpn300_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "B41E614E-708B-4793-B10A-E264AC128AC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:vpn300_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "DF398D47-F670-4669-B0BC-9BD9DEC553AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C45C303-1A95-4245-B242-3AB9B9106CD4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB62871-BC40-43D8-A486-471CD9316332",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:vpn1000_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "DA96F7C3-B9DA-4B14-8C69-05A8BC1C4FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:vpn1000_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "3F62D2F9-2D33-4E3F-B641-C721CF34B5C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECD311A-4E96-4576-AADF-47291EDE3559",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7079103C-ED92-40C3-AF42-4689822A96E2",
              "versionEndExcluding": "5.36",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC69FAB1-C862-470A-8CBF-BB8751485611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "8FD54572-2C29-4D2E-B15A-DE3A16D8E3CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7239C54F-EC9E-44B4-AE33-1D36E5448219",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_40_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F44F62-BE75-45DE-9160-E807F6789BE1",
              "versionEndExcluding": "4.73",
              "versionStartIncluding": "4.25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_40_firmware:4.73:-:*:*:*:*:*:*",
              "matchCriteriaId": "97239F61-5715-476B-BD20-B40746AAFE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_40_firmware:4.73:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "FA798B77-D4B4-4F21-A543-A6C5AAD7878F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D84DDB81-DE66-4427-8833-633B45A45A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_40w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1C7AA79-C28C-4075-B420-FE41D106D6C6",
              "versionEndExcluding": "4.73",
              "versionStartIncluding": "4.25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_40w_firmware:4.73:-:*:*:*:*:*:*",
              "matchCriteriaId": "1C2309AF-4FDB-4564-B2C4-B7BA67F1DA6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_40w_firmware:4.73:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "8A04A40D-7093-49E3-A7A7-8C6F148F460F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_40w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F11F36C-60DB-4D81-A320-53EEE43758C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_60w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "560B1BFF-DB43-426C-A3B9-BF9A595EA62F",
              "versionEndExcluding": "4.73",
              "versionStartIncluding": "4.25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_60w_firmware:4.73:-:*:*:*:*:*:*",
              "matchCriteriaId": "4C76684E-0F6D-4D89-8E59-343988366E1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_60w_firmware:4.73:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "14613F31-56A0-4F5B-9E1A-F316A4508F3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_60w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82864EF6-B63D-4947-A18C-AE0156CCA7FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_60_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3208CBB7-A4A2-4D92-9A40-766328C0CE4E",
              "versionEndExcluding": "4.73",
              "versionStartIncluding": "4.25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_60_firmware:4.73:-:*:*:*:*:*:*",
              "matchCriteriaId": "02C8DD42-9023-43B9-8B8B-BF9CC79E27E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:usg_60_firmware:4.73:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "8B7249A0-0AE1-4C01-BF04-BD8BA385C84D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C65DB5E9-2FE3-4807-970E-A42FDF82B50E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device."
    }
  ],
  "id": "CVE-2023-33010",
  "lastModified": "2025-10-27T17:04:54.083",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "security@zyxel.com.tw",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T13:15:09.640",
  "references": [
    {
      "source": "security@zyxel.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-33010"
    }
  ],
  "sourceIdentifier": "security@zyxel.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "security@zyxel.com.tw",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…