CVE-2023-43314

7.5 HIGH

📋 TL;DR

This buffer overflow vulnerability in Zyxel PMG2005-T20B firmware allows unauthenticated attackers to cause denial of service by sending specially crafted uid parameters. It affects users of the specific Zyxel device with vulnerable firmware. The vulnerability is particularly concerning because it requires no authentication.

💻 Affected Systems

Products:
  • Zyxel PMG2005-T20B
Versions: V1.00(ABNK.2)b11_C0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only this specific firmware version is confirmed affected. Note the 'UNSUPPORTED WHEN ASSIGNED' designation suggests limited vendor support.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reset, potentially disrupting network services for extended periods.

🟠

Likely Case

Temporary service interruption causing network downtime until device reboots automatically or manually.

🟢

If Mitigated

Minimal impact if device is behind proper network segmentation and firewalls.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation possible if device is exposed to internet.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or malware, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub issue shows exploitation details. Simple buffer overflow requiring minimal technical skill to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided in CVE

Restart Required: No

Instructions:

No official patch available. Check Zyxel website for firmware updates or consider device replacement.

🔧 Temporary Workarounds

Network Isolation

all

Place device behind firewall with strict access controls

Access Restriction

all

Restrict network access to device management interface

🧯 If You Can't Patch

  • Replace device with supported model
  • Implement strict network segmentation and monitoring

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or CLI: show version

Check Version:

show version (via CLI) or check web interface System Information

Verify Fix Applied:

Verify firmware version is different from V1.00(ABNK.2)b11_C0

📡 Detection & Monitoring

Log Indicators:

  • Device crash logs
  • Unexpected reboots
  • Failed authentication attempts with malformed uid

Network Indicators:

  • Unusual traffic to device management interface
  • Repeated connection attempts with malformed parameters

SIEM Query:

source="zyxel_pmg2005" AND (event_type="crash" OR event_type="reboot")

🔗 References

📤 Share & Export