{ "id": "CVE-2023-28768", "sourceIdentifier": "security@zyxel.com.tw", "published": "2023-08-14T17:15:10.157", "lastModified": "2023-08-21T16:07:05.947", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper frame handling in the Zyxel XGS2220-30 firmware version V4.80(ABXN.1), XMG1930-30 firmware version V4.80(ACAR.1), and XS1930-10 firmware version\u00a0V4.80(ABQE.1) could allow an unauthenticated LAN-based attacker to cause denial-of-service (DoS) conditions by sending crafted frames to an affected switch." } ], "metrics": { "cvssMetricV31": [ { "source": "security@zyxel.com.tw", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-755" } ] }, { "source": "security@zyxel.com.tw", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-755" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xgs2220-30_firmware:4.80\\(abxn.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2EEDB89-057E-4FA4-99BF-4A85C63B05B3" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xgs2220-30:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4F2BEA8-4817-4E14-B5B1-901671AD5E67" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xgs2220-30f_firmware:4.80\\(abye.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AEE3D04C-A256-43D8-B1CB-5D2F8308F48D" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xgs2220-30f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A53E4C3-77BD-4646-8B78-9E3A77585779" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xgs2220-30hp_firmware:4.80\\(abxo.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "318E9F6B-2D24-4FAD-86D6-CEEF5B69A606" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xgs2220-30hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ACCEDBD-3152-4549-9F80-C12715A51BE3" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xgs2220-54_firmware:4.80\\(abxp.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "827B19A6-3006-46EF-8A5A-C5800428A0A9" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xgs2220-54:-:*:*:*:*:*:*:*", "matchCriteriaId": "51B14340-165C-407D-B609-B17C44A90D4F" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xgs2220-54fp_firmware:4.80\\(acce.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "145E79B5-559E-4701-8232-E37665646947" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xgs2220-54fp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E578CCE-7347-4A9D-A8F2-ADEF6B37BDA2" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xgs2220-54hp_firmware:4.80\\(abxq.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F704060-74A6-4E63-B15F-D93D4B5ECC88" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xgs2220-54hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF030C04-7B74-4B23-8CE9-2D78403B188E" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xmg1930-30_firmware:4.80\\(acar.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E53CFC62-7077-41D2-8749-CDCCE9E021D7" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xmg1930-30:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D71444-A727-4B2A-AB17-3BC790829072" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xmg1930-30hp_firmware:4.80\\(acas.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "65963F09-74C2-4EA3-8DC8-D8C4EEC36538" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xmg1930-30hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "42C2DF2C-0060-45A3-99A3-0B5A37CCC241" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xs1930-10_firmware:4.80\\(abqe.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D037CF12-2F62-46AE-AEC0-8BFD94FBEAD0" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xs1930-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "F675B520-4F05-41D6-ADDF-C26A9C427A55" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xs1930-12f_firmware:4.80\\(abzv.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD3211B9-2B47-4328-AA29-E366A6D238DF" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xs1930-12f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB74204B-D5FB-44C6-A59C-8133ECE9CD75" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:xs1930-12hp_firmware:4.80\\(abqf.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E3E7BBA5-A534-45DE-A5C0-10EFEE929635" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:zyxel:xs1930-12hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E2171AB-AE63-45F6-9B22-2F93C105B18D" } ] } ] } ], "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-xgs2220-xmg1930-and-xs1930-series-switches", "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ] } ] }