Denial of service in Zyxel XGS2220, XMG1930, and XS1930 series switches



Published: 2023-08-23
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-28768
CWE-ID CWE-1021
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
XGS2220-30
Hardware solutions / Firmware

XGS2220-30F
Hardware solutions / Firmware

XGS2220-30HP
Hardware solutions / Firmware

XGS2220-54
Hardware solutions / Firmware

XGS2220-54FP
Hardware solutions / Firmware

XGS2220-54HP
Hardware solutions / Firmware

XMG1930-30
Hardware solutions / Firmware

XMG1930-30HP
Hardware solutions / Firmware

XS1930-10
Hardware solutions / Firmware

XS1930-12F
Hardware solutions / Firmware

XS1930-12HP
Hardware solutions / Firmware

Vendor ZyXEL Communications Corp.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper Restriction of Rendered UI Layers or Frames

EUVDB-ID: #VU79883

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-28768

CWE-ID: CWE-1021 - Improper Restriction of Rendered UI Layers or Frames

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper frame handling. A remote attacker on the local network can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

XGS2220-30: 4.80(ABXN.1)

XGS2220-30F: 4.80(ABYE.1)

XGS2220-30HP: 4.80(ABXO.1)

XGS2220-54: 4.80(ABXP.1)

XGS2220-54FP: 4.80(ACCE.1)

XGS2220-54HP: 4.80(ABXQ.1)

XMG1930-30: 4.80(ACAR.1)

XMG1930-30HP: 4.80(ACAS.1)

XS1930-10: 4.80(ABQE.1)

XS1930-12F: 4.80(ABZV.1)

XS1930-12HP: 4.80(ABQF.1)

External links

http://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-xgs2220-xmg1930-and-xs1930-series-switches


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###