cve/2023/CVE-2023-33010.md

24 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-33010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33010)
![](https://img.shields.io/static/v1?label=Product&message=ATP%20series%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=USG%20FLEX%2050(W)%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=USG%20FLEX%20series%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=USG20(W)-VPN%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=VPN%20series%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ZyWALL%2FUSG%20series%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen)
### Description
A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors