2023-08-21 18:00:42 +00:00

368 lines
9.7 KiB
JSON

{
"id": "CVE-2023-28768",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2023-08-14T17:15:10.157",
"lastModified": "2023-08-21T16:07:05.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper frame handling in the Zyxel XGS2220-30 firmware version V4.80(ABXN.1), XMG1930-30 firmware version V4.80(ACAR.1), and XS1930-10 firmware version\u00a0V4.80(ABQE.1) could allow an unauthenticated LAN-based attacker to cause denial-of-service (DoS) conditions by sending crafted frames to an affected switch."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zyxel.com.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
},
{
"source": "security@zyxel.com.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xgs2220-30_firmware:4.80\\(abxn.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A2EEDB89-057E-4FA4-99BF-4A85C63B05B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xgs2220-30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F2BEA8-4817-4E14-B5B1-901671AD5E67"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xgs2220-30f_firmware:4.80\\(abye.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AEE3D04C-A256-43D8-B1CB-5D2F8308F48D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xgs2220-30f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A53E4C3-77BD-4646-8B78-9E3A77585779"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xgs2220-30hp_firmware:4.80\\(abxo.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "318E9F6B-2D24-4FAD-86D6-CEEF5B69A606"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xgs2220-30hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ACCEDBD-3152-4549-9F80-C12715A51BE3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xgs2220-54_firmware:4.80\\(abxp.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "827B19A6-3006-46EF-8A5A-C5800428A0A9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xgs2220-54:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51B14340-165C-407D-B609-B17C44A90D4F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xgs2220-54fp_firmware:4.80\\(acce.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "145E79B5-559E-4701-8232-E37665646947"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xgs2220-54fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E578CCE-7347-4A9D-A8F2-ADEF6B37BDA2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xgs2220-54hp_firmware:4.80\\(abxq.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F704060-74A6-4E63-B15F-D93D4B5ECC88"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xgs2220-54hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF030C04-7B74-4B23-8CE9-2D78403B188E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xmg1930-30_firmware:4.80\\(acar.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E53CFC62-7077-41D2-8749-CDCCE9E021D7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xmg1930-30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58D71444-A727-4B2A-AB17-3BC790829072"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xmg1930-30hp_firmware:4.80\\(acas.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "65963F09-74C2-4EA3-8DC8-D8C4EEC36538"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xmg1930-30hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42C2DF2C-0060-45A3-99A3-0B5A37CCC241"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xs1930-10_firmware:4.80\\(abqe.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D037CF12-2F62-46AE-AEC0-8BFD94FBEAD0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xs1930-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F675B520-4F05-41D6-ADDF-C26A9C427A55"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xs1930-12f_firmware:4.80\\(abzv.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD3211B9-2B47-4328-AA29-E366A6D238DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xs1930-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB74204B-D5FB-44C6-A59C-8133ECE9CD75"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:xs1930-12hp_firmware:4.80\\(abqf.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E3E7BBA5-A534-45DE-A5C0-10EFEE929635"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:xs1930-12hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E2171AB-AE63-45F6-9B22-2F93C105B18D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-xgs2220-xmg1930-and-xs1930-series-switches",
"source": "security@zyxel.com.tw",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}