CVE-2023-35136: CWE-20 Improper Input Validation in Zyxel ATP series firmware
An improper input validation vulnerability in the “Quagga” package of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to access configuration files on an affected device.
AI Analysis
Technical Summary
CVE-2023-35136 is a medium-severity vulnerability identified in multiple Zyxel firewall and VPN device firmware versions, specifically in the Zyxel ATP series (versions 4.32 through 5.37), USG FLEX series (4.50 through 5.37), USG FLEX 50(W) series (4.16 through 5.37), USG20(W)-VPN series (4.16 through 5.37), and VPN series (4.30 through 5.37). The root cause is improper input validation (CWE-20) within the 'Quagga' package integrated into these firmware versions. Quagga is a routing software suite used to manage network routing protocols. This vulnerability allows an authenticated local attacker—meaning an attacker with valid credentials and local access to the device—to exploit insufficient input validation to access configuration files on the affected device. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). The vulnerability does not require user interaction but does require the attacker to have some level of authenticated access to the device, which limits the attack surface to insiders or attackers who have already compromised credentials. Access to configuration files can expose sensitive network configurations, credentials, VPN settings, and other security parameters, potentially enabling further attacks or lateral movement within a network. No known exploits are reported in the wild as of the publication date (November 28, 2023), and no patches are explicitly linked, indicating that organizations should verify firmware updates from Zyxel. The vulnerability affects a broad range of Zyxel firewall and VPN devices commonly deployed in enterprise and SMB environments for perimeter security and VPN connectivity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security infrastructure. Zyxel devices are widely used in Europe, especially among small and medium enterprises and some larger organizations due to their cost-effectiveness and feature set. An attacker with authenticated access could extract sensitive configuration data, including VPN credentials and routing information, potentially enabling unauthorized network access or facilitating further attacks such as lateral movement or data exfiltration. This could lead to breaches of confidentiality, especially in sectors handling sensitive or regulated data such as finance, healthcare, and government. The impact is heightened in environments where multi-factor authentication or strict access controls are not enforced, as attackers could leverage stolen or weak credentials to exploit this vulnerability. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach alone can have severe consequences, including regulatory penalties under GDPR if personal data is exposed or network security is compromised. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic advice: 1) Verify and apply the latest Zyxel firmware updates as soon as they become available, monitoring Zyxel’s official channels for patches addressing CVE-2023-35136. 2) Restrict administrative access to Zyxel devices strictly to trusted personnel and enforce strong authentication mechanisms, ideally multi-factor authentication, to reduce the risk of credential compromise. 3) Implement network segmentation to limit local access to these devices, ensuring that only authorized management stations can connect to the device management interfaces. 4) Conduct regular audits of device access logs to detect any unusual or unauthorized access attempts. 5) Review and harden device configurations to disable unnecessary services or interfaces that could be leveraged for local access. 6) Consider deploying intrusion detection or prevention systems that can monitor for anomalous activities related to configuration file access or unusual administrative commands. 7) Educate network administrators about this vulnerability and the importance of safeguarding credentials and access paths to Zyxel devices. These targeted actions will reduce the attack surface and limit potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2023-35136: CWE-20 Improper Input Validation in Zyxel ATP series firmware
Description
An improper input validation vulnerability in the “Quagga” package of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to access configuration files on an affected device.
AI-Powered Analysis
Technical Analysis
CVE-2023-35136 is a medium-severity vulnerability identified in multiple Zyxel firewall and VPN device firmware versions, specifically in the Zyxel ATP series (versions 4.32 through 5.37), USG FLEX series (4.50 through 5.37), USG FLEX 50(W) series (4.16 through 5.37), USG20(W)-VPN series (4.16 through 5.37), and VPN series (4.30 through 5.37). The root cause is improper input validation (CWE-20) within the 'Quagga' package integrated into these firmware versions. Quagga is a routing software suite used to manage network routing protocols. This vulnerability allows an authenticated local attacker—meaning an attacker with valid credentials and local access to the device—to exploit insufficient input validation to access configuration files on the affected device. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). The vulnerability does not require user interaction but does require the attacker to have some level of authenticated access to the device, which limits the attack surface to insiders or attackers who have already compromised credentials. Access to configuration files can expose sensitive network configurations, credentials, VPN settings, and other security parameters, potentially enabling further attacks or lateral movement within a network. No known exploits are reported in the wild as of the publication date (November 28, 2023), and no patches are explicitly linked, indicating that organizations should verify firmware updates from Zyxel. The vulnerability affects a broad range of Zyxel firewall and VPN devices commonly deployed in enterprise and SMB environments for perimeter security and VPN connectivity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security infrastructure. Zyxel devices are widely used in Europe, especially among small and medium enterprises and some larger organizations due to their cost-effectiveness and feature set. An attacker with authenticated access could extract sensitive configuration data, including VPN credentials and routing information, potentially enabling unauthorized network access or facilitating further attacks such as lateral movement or data exfiltration. This could lead to breaches of confidentiality, especially in sectors handling sensitive or regulated data such as finance, healthcare, and government. The impact is heightened in environments where multi-factor authentication or strict access controls are not enforced, as attackers could leverage stolen or weak credentials to exploit this vulnerability. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach alone can have severe consequences, including regulatory penalties under GDPR if personal data is exposed or network security is compromised. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic advice: 1) Verify and apply the latest Zyxel firmware updates as soon as they become available, monitoring Zyxel’s official channels for patches addressing CVE-2023-35136. 2) Restrict administrative access to Zyxel devices strictly to trusted personnel and enforce strong authentication mechanisms, ideally multi-factor authentication, to reduce the risk of credential compromise. 3) Implement network segmentation to limit local access to these devices, ensuring that only authorized management stations can connect to the device management interfaces. 4) Conduct regular audits of device access logs to detect any unusual or unauthorized access attempts. 5) Review and harden device configurations to disable unnecessary services or interfaces that could be leveraged for local access. 6) Consider deploying intrusion detection or prevention systems that can monitor for anomalous activities related to configuration file access or unusual administrative commands. 7) Educate network administrators about this vulnerability and the importance of safeguarding credentials and access paths to Zyxel devices. These targeted actions will reduce the attack surface and limit potential exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Zyxel
- Date Reserved
- 2023-06-14T06:26:48.563Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6841a29c182aa0cae2e196bf
Added to database: 6/5/2025, 1:58:52 PM
Last enriched: 7/7/2025, 10:40:40 AM
Last updated: 7/28/2025, 5:28:25 PM
Views: 10
Related Threats
CVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.