Wednesday, April 16, 2025
HomeCVE/vulnerabilityZyxel Firewall Flaw Let Attackers Execute Remote Code

Zyxel Firewall Flaw Let Attackers Execute Remote Code

Published on

SIEM as a Service

Follow Us on Google News

Four new vulnerabilities have been discovered in some of the Zyxel Firewall and access point (AP) versions that are associated with Denial of Service, OS Command Injection, and Remote code execution.

These vulnerabilities have been assigned with CVE-2023-6397, CVE-2023-6398, CVE-2023-6399, and CVE-2023-6764.

The severity of these vulnerabilities ranges between 6.5 (Medium) and 8.1 (High). However, Zyxel networks have fixed these vulnerabilities, and a security advisory has been released to address these vulnerabilities.

- Advertisement - Google News

Zyxel Firewall Flaw

CVE-2023-6397: Null Pointer Dereference vulnerability in Zyxel

This vulnerability could allow a LAN-based threat actor to cause a denial-of-service condition by downloading a crafted RAR compressed file onto a LAN-side host if the firewall has “Anti-Malware” feature enabled.

The severity for this vulnerability has been given as 6.5 (Medium).

CVE-2023-6398: Post-authentication Command Injection vulnerability

This vulnerability exists in the file upload binary in Zyxel ATP series devices that could allow an authentication threat actor to execute operating system commands on the affected device via FTP with administrative privileges.

The severity for this vulnerability has been given as 7.2 (High).

CVE-2023-6399: Format String Vulnerability in Zyxel

This vulnerability allows an authenticated IPSec VPN user to perform a denial of service condition against the deviceid daemon.

Successful exploitation of this vulnerability involves sending a crafted hostname to an affected device if the device has the “Device Insight” feature enabled.

The severity for this vulnerability has been given as 5.7 (Medium).

CVE-2023-6764: Format String Vulnerability in Zyxel leading to Unauthenticated RCE

This vulnerability exists in one of the functions of the IPSec VPN feature that could allow a threat actor to achieve unauthenticated remote code execution on the affected device by sending a sequence of specially crafted payloads with an invalid pointer. 

However, this attack requires a detailed knowledge of the affected device’s memory layout and configuration. The severity for this vulnerability has been given as 8.1 (High).

Affected Products And Versions

Users of these products are recommended to upgrade to the latest versions in order to prevent these vulnerabilities from getting exploited by threat actors.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing...

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the growing sophistication of cyber...

WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack

A new form of phishing attack is making waves among job seekers, as cybercriminals...

SOC Alert Fatigue Hits Peak Levels As Teams Battle Notification Overload

Security Operations Centers (SOCs) are facing a mounting crisis: alert fatigue. As cyber threats...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing...

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the growing sophistication of cyber...

WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack

A new form of phishing attack is making waves among job seekers, as cybercriminals...