2023-08-14 18:00:52 +00:00
{
"id" : "CVE-2023-28768" ,
"sourceIdentifier" : "security@zyxel.com.tw" ,
"published" : "2023-08-14T17:15:10.157" ,
2023-08-21 18:00:42 +00:00
"lastModified" : "2023-08-21T16:07:05.947" ,
"vulnStatus" : "Analyzed" ,
2023-08-14 18:00:52 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Improper frame handling in the Zyxel XGS2220-30 firmware version V4.80(ABXN.1), XMG1930-30 firmware version V4.80(ACAR.1), and XS1930-10 firmware version\u00a0V4.80(ABQE.1) could allow an unauthenticated LAN-based attacker to cause denial-of-service (DoS) conditions by sending crafted frames to an affected switch."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security@zyxel.com.tw" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
2023-08-21 18:00:42 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-755"
}
]
} ,
2023-08-14 18:00:52 +00:00
{
"source" : "security@zyxel.com.tw" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-755"
}
]
}
] ,
2023-08-21 18:00:42 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xgs2220-30_firmware:4.80\\(abxn.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2EEDB89-057E-4FA4-99BF-4A85C63B05B3"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xgs2220-30:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4F2BEA8-4817-4E14-B5B1-901671AD5E67"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xgs2220-30f_firmware:4.80\\(abye.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEE3D04C-A256-43D8-B1CB-5D2F8308F48D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xgs2220-30f:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A53E4C3-77BD-4646-8B78-9E3A77585779"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xgs2220-30hp_firmware:4.80\\(abxo.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "318E9F6B-2D24-4FAD-86D6-CEEF5B69A606"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xgs2220-30hp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7ACCEDBD-3152-4549-9F80-C12715A51BE3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xgs2220-54_firmware:4.80\\(abxp.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "827B19A6-3006-46EF-8A5A-C5800428A0A9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xgs2220-54:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51B14340-165C-407D-B609-B17C44A90D4F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xgs2220-54fp_firmware:4.80\\(acce.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "145E79B5-559E-4701-8232-E37665646947"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xgs2220-54fp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E578CCE-7347-4A9D-A8F2-ADEF6B37BDA2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xgs2220-54hp_firmware:4.80\\(abxq.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F704060-74A6-4E63-B15F-D93D4B5ECC88"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xgs2220-54hp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF030C04-7B74-4B23-8CE9-2D78403B188E"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xmg1930-30_firmware:4.80\\(acar.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E53CFC62-7077-41D2-8749-CDCCE9E021D7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xmg1930-30:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58D71444-A727-4B2A-AB17-3BC790829072"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xmg1930-30hp_firmware:4.80\\(acas.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "65963F09-74C2-4EA3-8DC8-D8C4EEC36538"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xmg1930-30hp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "42C2DF2C-0060-45A3-99A3-0B5A37CCC241"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xs1930-10_firmware:4.80\\(abqe.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D037CF12-2F62-46AE-AEC0-8BFD94FBEAD0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xs1930-10:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F675B520-4F05-41D6-ADDF-C26A9C427A55"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xs1930-12f_firmware:4.80\\(abzv.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD3211B9-2B47-4328-AA29-E366A6D238DF"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xs1930-12f:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB74204B-D5FB-44C6-A59C-8133ECE9CD75"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:xs1930-12hp_firmware:4.80\\(abqf.1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E3E7BBA5-A534-45DE-A5C0-10EFEE929635"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zyxel:xs1930-12hp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E2171AB-AE63-45F6-9B22-2F93C105B18D"
}
]
}
]
}
] ,
2023-08-14 18:00:52 +00:00
"references" : [
{
"url" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-xgs2220-xmg1930-and-xs1930-series-switches" ,
2023-08-21 18:00:42 +00:00
"source" : "security@zyxel.com.tw" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-08-14 18:00:52 +00:00
}
]
}