CVE-2023-33009

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in Zyxel firewall notification functions allows unauthenticated attackers to cause denial-of-service or execute arbitrary code remotely. This affects multiple Zyxel firewall product lines running vulnerable firmware versions. Organizations using these devices as perimeter security are particularly at risk.

💻 Affected Systems

Products:
  • Zyxel ATP series
  • USG FLEX series
  • USG FLEX 50(W)
  • USG20(W)-VPN
  • VPN series
  • ZyWALL/USG series
Versions: 4.60 through 5.36 Patch 1 for most products, 4.60 through 4.73 Patch 1 for ZyWALL/USG series
Operating Systems: Zyxel proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected firmware versions are vulnerable by default; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and persistent backdoor installation.

🟠

Likely Case

Denial-of-service causing firewall outage, network disruption, and potential lateral movement opportunities.

🟢

If Mitigated

Limited to DoS with proper network segmentation and intrusion prevention systems in place.

🌐 Internet-Facing: HIGH - Firewalls are typically internet-facing and the exploit requires no authentication.
🏢 Internal Only: MEDIUM - Lower if devices aren't exposed externally, but still vulnerable to internal threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 5.36 Patch 2 for most products, after 4.73 Patch 2 for ZyWALL/USG series

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls

Restart Required: Yes

Instructions:

1. Download latest firmware from Zyxel support portal. 2. Backup configuration. 3. Upload firmware via web interface. 4. Apply update. 5. Reboot device. 6. Verify version.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to firewall management interfaces to trusted networks only.

Access Control Lists

all

Implement ACLs to block unnecessary traffic to firewall interfaces.

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict access controls
  • Implement network-based intrusion prevention systems to detect and block exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > Maintenance > System Information, or CLI: show version

Check Version:

show version (CLI) or check System Information in web interface

Verify Fix Applied:

Confirm firmware version is above vulnerable ranges: ATP/USG FLEX >5.36 Patch 2, ZyWALL/USG >4.73 Patch 2

📡 Detection & Monitoring

Log Indicators:

  • Unusual traffic patterns to firewall interfaces
  • Multiple connection attempts from single sources
  • System crash/reboot logs

Network Indicators:

  • Unexpected traffic spikes to firewall management ports
  • Malformed packets targeting firewall services

SIEM Query:

source_ip="firewall_management_ip" AND (event_type="connection_attempt" OR event_type="system_reboot")

🔗 References

📤 Share & Export