CVE-2023-34141

moderate-risk
Published 2023-07-17

A command injection vulnerability in the access point (AP) management feature of the Zyxel ATP series firmware versions 5.00 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.00 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.00 through 5.36 Patch 2, VPN series firmware versions 5.00 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the managed AP list in advance.

Do I need to act?

-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.0/10 High
ADJACENT_NETWORK / LOW complexity

Affected Products (20)

Usg 20W-Vpn Firmware
Usg 2200-Vpn Firmware
Zywall Atp100 Firmware
Zywall Atp100W Firmware
Zywall Atp200 Firmware
Zywall Atp500 Firmware
Zywall Atp700 Firmware
Zywall Atp800 Firmware
Zywall Vpn100 Firmware
Zywall Vpn2S Firmware
Zywall Vpn300 Firmware
Zywall Vpn50 Firmware
Zywall Vpn 100 Firmware

Affected Vendors

47
/ 100
moderate-risk
Severity 25/34 · High
Exploitability 1/34 · Minimal
Exposure 21/34 · High