CVE-2023-33009

A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*
OR cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100_firmware:5.36:patch1:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*
OR cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp200_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp200_firmware:5.36:patch1:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*
OR cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp500_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp500_firmware:5.36:patch1:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*
OR cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp100w_firmware:5.36:patch1:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*
OR cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp700_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp700_firmware:5.36:patch1:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*
OR cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp800_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:atp800_firmware:5.36:patch1:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*
OR cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.36:patch1:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*
OR cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.36:patch1:*:*:*:*:*:*

Configuration 9 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
OR cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
OR cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_20w-vpn_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
OR cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn100_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn100_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
OR cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn50_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn50_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
OR cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn300_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn300_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
OR cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn1000_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:vpn1000_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
OR cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg20-vpn_firmware:5.36:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
OR cpe:2.3:o:zyxel:usg_40_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_40:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
OR cpe:2.3:o:zyxel:usg_40w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40w_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_40w_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_40w:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
OR cpe:2.3:o:zyxel:usg_60w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60w_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60w_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_60w:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
OR cpe:2.3:o:zyxel:usg_60_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60_firmware:4.73:-:*:*:*:*:*:*
cpe:2.3:o:zyxel:usg_60_firmware:4.73:patch1:*:*:*:*:*:*
cpe:2.3:h:zyxel:usg_60:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-05-24 13:15

Updated : 2024-04-01 15:51


NVD link : CVE-2023-33009

Mitre link : CVE-2023-33009

CVE.ORG link : CVE-2023-33009


JSON object : View

Products Affected

zyxel

  • usg_40w_firmware
  • usg_flex_500
  • atp200
  • vpn1000_firmware
  • usg_60w
  • usg_flex_50_firmware
  • usg_flex_100w_firmware
  • vpn100
  • usg_flex_700_firmware
  • usg_flex_100w
  • usg_flex_200_firmware
  • usg20-vpn_firmware
  • atp500_firmware
  • usg_flex_100_firmware
  • atp200_firmware
  • usg_flex_50w_firmware
  • vpn50_firmware
  • usg_flex_200
  • atp100w_firmware
  • usg_20w-vpn
  • atp700
  • atp800_firmware
  • usg_flex_700
  • atp100
  • usg_60w_firmware
  • vpn1000
  • usg_flex_50
  • usg_20w-vpn_firmware
  • vpn50
  • atp100_firmware
  • usg_40w
  • vpn100_firmware
  • atp100w
  • usg_flex_100
  • atp700_firmware
  • usg_40_firmware
  • usg_flex_500_firmware
  • usg_40
  • usg_60
  • atp800
  • vpn300_firmware
  • atp500
  • usg20-vpn
  • usg_flex_50w
  • usg_60_firmware
  • vpn300
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')