CVE-2023-28767

8.8 HIGH

📋 TL;DR

This vulnerability allows an unauthenticated attacker on the local network to inject OS commands into the configuration data of affected Zyxel devices when cloud management is enabled. It affects multiple Zyxel firewall and VPN series, potentially leading to remote code execution. The risk is primarily to organizations using these devices with the vulnerable firmware and cloud management feature.

💻 Affected Systems

Products:
  • Zyxel ATP series
  • USG FLEX series
  • USG FLEX 50(W) series
  • USG20(W)-VPN series
  • VPN series
Versions: ATP: 5.10 through 5.36; USG FLEX: 5.00 through 5.36; USG FLEX 50(W): 5.10 through 5.36; USG20(W)-VPN: 5.10 through 5.36; VPN: 5.00 through 5.36
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Cloud management mode must be enabled for exploitation; devices with this disabled are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain full control of the device, execute arbitrary commands, steal sensitive data, pivot to internal networks, or disrupt network operations.

🟠

Likely Case

An attacker could compromise the device to modify configurations, disrupt services, or use it as a foothold for further attacks within the network.

🟢

If Mitigated

With cloud management disabled and proper network segmentation, the attack surface is reduced, limiting impact to potential denial-of-service or configuration changes if other vulnerabilities are present.

🌐 Internet-Facing: LOW with brief explanation: The vulnerability requires LAN-based access; direct internet exploitation is not possible unless the device is misconfigured or other vulnerabilities allow remote access.
🏢 Internal Only: HIGH with brief explanation: Attackers on the local network can exploit this without authentication, posing a significant internal threat to network security.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward for attackers with LAN access and cloud management enabled, but no public proof-of-concept has been disclosed as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 5.36 for affected series; check vendor advisory for specific patched versions.

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers

Restart Required: Yes

Instructions:

1. Access the Zyxel device management interface. 2. Check current firmware version. 3. Download the latest firmware from Zyxel's support site. 4. Upload and apply the firmware update via the management interface. 5. Reboot the device as prompted.

🔧 Temporary Workarounds

Disable Cloud Management

all

Turn off cloud management mode to prevent exploitation, as the vulnerability only affects devices with this feature enabled.

Log into the device's web interface, navigate to Cloud Management settings, and disable it.

🧯 If You Can't Patch

  • Disable cloud management mode immediately to mitigate the vulnerability.
  • Implement strict network segmentation to isolate affected devices from untrusted internal networks.

🔍 How to Verify

Check if Vulnerable:

Check the firmware version via the device's web interface or CLI; if it falls within the affected ranges and cloud management is enabled, the device is vulnerable.

Check Version:

In the device CLI, use 'show version' or check via the web interface under System > Firmware.

Verify Fix Applied:

After patching, confirm the firmware version is above 5.36 (or the patched version specified by Zyxel) and that cloud management remains disabled if not needed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual configuration changes, unexpected command executions, or failed login attempts from LAN IPs when cloud management is active.

Network Indicators:

  • Suspicious traffic from the device to external servers or internal systems, indicating potential command injection or data exfiltration.

SIEM Query:

Example: 'source="zyxel_device" AND (event_type="config_change" OR command="inject*")'

🔗 References

📤 Share & Export