CVE-2023-33012

8.8 HIGH

📋 TL;DR

An unauthenticated LAN-based attacker can execute arbitrary OS commands on affected Zyxel network devices by sending a malicious GRE configuration when cloud management is enabled. This affects multiple Zyxel firewall and VPN product series with specific firmware versions. The vulnerability allows remote code execution without authentication.

💻 Affected Systems

Products:
  • Zyxel ATP series
  • Zyxel USG FLEX series
  • Zyxel USG FLEX 50(W) series
  • Zyxel USG20(W)-VPN series
  • Zyxel VPN series
Versions: ATP: 5.10 through 5.36 Patch 2; USG FLEX: 5.00 through 5.36 Patch 2; USG FLEX 50(W): 5.10 through 5.36 Patch 2; USG20(W)-VPN: 5.10 through 5.36 Patch 2; VPN: 5.00 through 5.36 Patch 2
Operating Systems: Zyxel proprietary firmware
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when cloud management mode is enabled. Requires LAN-based access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the network device, allowing attacker to pivot to internal networks, steal credentials, install persistent backdoors, or disrupt network operations.

🟠

Likely Case

Attacker gains shell access to the device, can modify configurations, intercept traffic, or use the device as a foothold for lateral movement.

🟢

If Mitigated

Limited impact if cloud management is disabled or network segmentation prevents LAN-based attacks.

🌐 Internet-Facing: MEDIUM - Requires LAN access, but could be combined with other vulnerabilities or social engineering to gain initial access.
🏢 Internal Only: HIGH - Directly exploitable by any compromised internal system or malicious insider on the LAN.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting a malicious GRE configuration packet and sending it to the device when cloud management is enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 5.36 Patch 2

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers

Restart Required: Yes

Instructions:

1. Download latest firmware from Zyxel support portal. 2. Backup current configuration. 3. Upload and install firmware update via web interface or CLI. 4. Reboot device. 5. Verify firmware version.

🔧 Temporary Workarounds

Disable Cloud Management

all

Disable cloud management mode to prevent exploitation of this vulnerability.

Navigate to Configuration > System > Cloud Management and disable

Network Segmentation

all

Restrict LAN access to management interfaces using VLANs or firewall rules.

🧯 If You Can't Patch

  • Disable cloud management mode immediately
  • Implement strict network segmentation to limit LAN access to management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Status) or CLI (show version). Verify if version falls within affected ranges and cloud management is enabled.

Check Version:

show version (CLI) or check System > Status in web interface

Verify Fix Applied:

Confirm firmware version is above 5.36 Patch 2. Verify cloud management status in configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GRE configuration changes
  • Unexpected command execution logs
  • Failed authentication attempts to device management

Network Indicators:

  • Malformed GRE packets to management interfaces
  • Unexpected outbound connections from network devices

SIEM Query:

source="zyxel_firewall" AND (event_type="config_change" AND config_field="gre" OR event_type="command_execution")

🔗 References

📤 Share & Export