Skip to main content

CVE-2023-35136: CWE-20 Improper Input Validation in Zyxel ATP series firmware

Medium
VulnerabilityCVE-2023-35136cvecve-2023-35136cwe-20
Published: Tue Nov 28 2023 (11/28/2023, 01:16:16 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: ATP series firmware

Description

An improper input validation vulnerability in the “Quagga” package of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to access configuration files on an affected device.

AI-Powered Analysis

AILast updated: 07/07/2025, 10:40:40 UTC

Technical Analysis

CVE-2023-35136 is a medium-severity vulnerability identified in multiple Zyxel firewall and VPN device firmware versions, specifically in the Zyxel ATP series (versions 4.32 through 5.37), USG FLEX series (4.50 through 5.37), USG FLEX 50(W) series (4.16 through 5.37), USG20(W)-VPN series (4.16 through 5.37), and VPN series (4.30 through 5.37). The root cause is improper input validation (CWE-20) within the 'Quagga' package integrated into these firmware versions. Quagga is a routing software suite used to manage network routing protocols. This vulnerability allows an authenticated local attacker—meaning an attacker with valid credentials and local access to the device—to exploit insufficient input validation to access configuration files on the affected device. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). The vulnerability does not require user interaction but does require the attacker to have some level of authenticated access to the device, which limits the attack surface to insiders or attackers who have already compromised credentials. Access to configuration files can expose sensitive network configurations, credentials, VPN settings, and other security parameters, potentially enabling further attacks or lateral movement within a network. No known exploits are reported in the wild as of the publication date (November 28, 2023), and no patches are explicitly linked, indicating that organizations should verify firmware updates from Zyxel. The vulnerability affects a broad range of Zyxel firewall and VPN devices commonly deployed in enterprise and SMB environments for perimeter security and VPN connectivity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security infrastructure. Zyxel devices are widely used in Europe, especially among small and medium enterprises and some larger organizations due to their cost-effectiveness and feature set. An attacker with authenticated access could extract sensitive configuration data, including VPN credentials and routing information, potentially enabling unauthorized network access or facilitating further attacks such as lateral movement or data exfiltration. This could lead to breaches of confidentiality, especially in sectors handling sensitive or regulated data such as finance, healthcare, and government. The impact is heightened in environments where multi-factor authentication or strict access controls are not enforced, as attackers could leverage stolen or weak credentials to exploit this vulnerability. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach alone can have severe consequences, including regulatory penalties under GDPR if personal data is exposed or network security is compromised. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability beyond generic advice: 1) Verify and apply the latest Zyxel firmware updates as soon as they become available, monitoring Zyxel’s official channels for patches addressing CVE-2023-35136. 2) Restrict administrative access to Zyxel devices strictly to trusted personnel and enforce strong authentication mechanisms, ideally multi-factor authentication, to reduce the risk of credential compromise. 3) Implement network segmentation to limit local access to these devices, ensuring that only authorized management stations can connect to the device management interfaces. 4) Conduct regular audits of device access logs to detect any unusual or unauthorized access attempts. 5) Review and harden device configurations to disable unnecessary services or interfaces that could be leveraged for local access. 6) Consider deploying intrusion detection or prevention systems that can monitor for anomalous activities related to configuration file access or unusual administrative commands. 7) Educate network administrators about this vulnerability and the importance of safeguarding credentials and access paths to Zyxel devices. These targeted actions will reduce the attack surface and limit potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zyxel
Date Reserved
2023-06-14T06:26:48.563Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6841a29c182aa0cae2e196bf

Added to database: 6/5/2025, 1:58:52 PM

Last enriched: 7/7/2025, 10:40:40 AM

Last updated: 7/28/2025, 5:28:25 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats