PT-2023-2841 · Zyxel · Zywall/Usg +3
Published
2023-04-24
·
Updated
2025-09-22
·
CVE-2023-28771
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73
Zyxel VPN series firmware versions 4.60 through 5.35
Zyxel USG FLEX series firmware versions 4.60 through 5.35
Zyxel ATP series firmware versions 4.60 through 5.35
Description
The issue is related to improper error message handling, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device. This vulnerability has been exploited by several distributed denial-of-service (DDoS) botnets, including Mirai botnets, and has been used in real-world incidents, such as the cyber attacks targeting Denmark's energy sector in 2023. The estimated number of potentially affected devices worldwide is not specified, but it is known that Zyxel firewalls are widely used by organizations. Technical details about exploitation include the use of UDP port 500 and the execution of arbitrary system commands.
Recommendations
For Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, update to a version outside of this range.
For Zyxel VPN series firmware versions 4.60 through 5.35, update to a version outside of this range.
For Zyxel USG FLEX series firmware versions 4.60 through 5.35, update to a version outside of this range.
For Zyxel ATP series firmware versions 4.60 through 5.35, update to a version outside of this range.
As a temporary workaround, consider restricting access to UDP port 500 to minimize the risk of exploitation.
Exploit
Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2023-02782
CVE-2023-28771
Affected Products
Atp
Usg Flex
Vpn
Zywall/Usg
References · 72
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/zyxel_ike_decoder_rce_cve_2023_28771.rb⭐ 34302 🔗 14014 · Exploit
- 🔥 https://github.com/benjaminhays/CVE-2023-28771-PoC⭐ 28 🔗 7 · Exploit
- 🔥 https://github.com/BenHays142/CVE-2023-28771-PoC⭐ 28 🔗 7 · Exploit
- 🔥 https://github.com/fed-speak/CVE-2023-28771-PoC⭐ 28 🔗 7 · Exploit
- 🔥❌ https://github.com/WhiteOwl-Pub/PoC-CVE-2023-28771 · Exploit, Deleted
- 🔥 http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html · Exploit
- 🔥❌ https://github.com/WhiteOwl-Pub/Zyxel-PoC-CVE-2023-28771 · Exploit, Deleted
- https://bdu.fstec.ru/vul/2023-02782 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2023-28771 · Security Note
- https://zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls · Security Note, Vendor Advisory
- https://twitter.com/ZoomZoomZero/status/1825915955601461746 · Twitter Post
- https://t.me/thehackernews/3628 · Telegram Post
- https://t.me/pentestingnews/35517 · Telegram Post
- https://twitter.com/transilienceai/status/1935121016079991126 · Twitter Post
- https://twitter.com/LiviuCMunteanu/status/1749311489331044821 · Twitter Post