PT-2023-2841 · Zyxel · Atp +3
Published
2023-04-24
·
Updated
2025-09-16
·
CVE-2023-28771
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73
Zyxel VPN series firmware versions 4.60 through 5.35
Zyxel USG FLEX series firmware versions 4.60 through 5.35
Zyxel ATP series firmware versions 4.60 through 5.35
Description:
The issue is related to improper error message handling in Zyxel devices, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device. This vulnerability has been exploited by several distributed denial-of-service (DDoS) botnets, including Mirai botnet variants, and has been used in real-world incidents, such as the cyber attacks targeting Denmark's energy sector in 2023. The estimated number of potentially affected devices worldwide is not specified, but it is known that Zyxel firewalls are widely used by organizations.
Recommendations:
For Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, update to a version outside of this range.
For Zyxel VPN series firmware versions 4.60 through 5.35, update to a version outside of this range.
For Zyxel USG FLEX series firmware versions 4.60 through 5.35, update to a version outside of this range.
For Zyxel ATP series firmware versions 4.60 through 5.35, update to a version outside of this range.
As a temporary workaround, consider restricting access to the vulnerable devices and implementing additional security measures to minimize the risk of exploitation.
Exploit
Fix
RCE
OS Command Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 71
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/zyxel_ike_decoder_rce_cve_2023_28771.rb⭐ 34302 🔗 14014 · Exploit
- 🔥 https://github.com/fed-speak/CVE-2023-28771-PoC⭐ 28 🔗 7 · Exploit
- 🔥 https://github.com/benjaminhays/CVE-2023-28771-PoC⭐ 28 🔗 7 · Exploit
- 🔥 https://github.com/BenHays142/CVE-2023-28771-PoC⭐ 28 🔗 7 · Exploit
- 🔥 http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html · Exploit
- 🔥❌ https://github.com/WhiteOwl-Pub/PoC-CVE-2023-28771 · Exploit, Deleted
- 🔥❌ https://github.com/WhiteOwl-Pub/Zyxel-PoC-CVE-2023-28771 · Exploit, Deleted
- https://bdu.fstec.ru/vul/2023-02782 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2023-28771 · Security Note
- https://zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls · Security Note, Vendor Advisory
- https://twitter.com/moton/status/1934978301908668565 · Twitter Post
- https://twitter.com/NotTruppi/status/1937118521080590337 · Twitter Post
- https://twitter.com/attritionorg/status/1894859381407461517 · Twitter Post
- https://twitter.com/clovernetics/status/1707727107671851196 · Twitter Post
- https://twitter.com/omvapt/status/1935078032374444461 · Twitter Post