Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9133: CWE-862 Missing Authorization in Zyxel ATP series firmware

0
High
VulnerabilityCVE-2025-9133cvecve-2025-9133cwe-862
Published: Tue Oct 21 2025 (10/21/2025, 01:57:20 UTC)
Source: CVE Database V5
Vendor/Project: Zyxel
Product: ATP series firmware

Description

A missing authorization vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.40, USG FLEX series firmware versions from V4.50 through V5.40, USG FLEX 50(W) series firmware versions from V4.16 through V5.40, and USG20(W)-VPN series firmware versions from V4.16 through V5.40 could allow a semi-authenticated attacker—who has completed only the first stage of the two-factor authentication (2FA) process—to view and download the system configuration from an affected device.

AI-Powered Analysis

AILast updated: 10/21/2025, 02:47:49 UTC

Technical Analysis

CVE-2025-9133 is a missing authorization vulnerability classified under CWE-862, affecting Zyxel ATP series firmware versions from V4.32 through V5.40, USG FLEX series from V4.50 through V5.40, USG FLEX 50(W) series from V4.16 through V5.40, and USG20(W)-VPN series from V4.16 through V5.40. The flaw arises because the firmware does not properly enforce authorization checks after the first stage of two-factor authentication (2FA). An attacker who has successfully completed the initial 2FA step but not the full authentication process can exploit this weakness to view and download the entire system configuration from the device. This configuration data likely contains sensitive information such as network topology, firewall rules, VPN credentials, and administrative settings. The vulnerability requires network-level access and a low privilege level (partial authentication), but no user interaction beyond that. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality and integrity with low attack complexity and no user interaction required. No public exploits are currently known, but the vulnerability is publicly disclosed and assigned a CVE ID. The lack of patch links suggests that fixes may be forthcoming or pending deployment. This vulnerability could be leveraged by attackers to gain deep insight into network defenses and potentially facilitate further compromise or lateral movement within affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-9133 is significant due to the potential exposure of sensitive network configuration data. Disclosure of firewall rules, VPN credentials, and administrative settings can lead to unauthorized network access, data exfiltration, and disruption of services. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Zyxel ATP and USG devices for perimeter security and VPN access are particularly at risk. Attackers exploiting this vulnerability could bypass full authentication controls, undermining multi-factor authentication protections and increasing the likelihood of successful intrusions. The exposure of configuration data also facilitates targeted attacks, including privilege escalation and lateral movement. Given the widespread use of Zyxel devices in Europe, especially in small to medium enterprises and public sector entities, the vulnerability poses a broad threat. The absence of known exploits currently limits immediate risk, but the high CVSS score and ease of exploitation suggest rapid weaponization is possible once exploit code is developed.

Mitigation Recommendations

European organizations should immediately inventory Zyxel devices to identify affected firmware versions and restrict network access to management interfaces to trusted hosts only. Deploy network segmentation and access control lists to limit exposure of vulnerable devices. Enable full two-factor authentication enforcement and monitor authentication logs for suspicious partial 2FA completions. Implement strict monitoring and alerting for configuration download attempts or unusual administrative activity. Coordinate with Zyxel for timely firmware updates and apply patches as soon as they become available. In the interim, consider disabling remote management interfaces or using VPNs with strong authentication to access device management consoles. Conduct penetration testing and vulnerability assessments focused on these devices to detect potential exploitation attempts. Finally, educate IT staff on the risks of partial authentication bypass and enforce strong credential policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zyxel
Date Reserved
2025-08-19T01:09:14.783Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f6f0dbb870ea37e2aefe45

Added to database: 10/21/2025, 2:32:59 AM

Last enriched: 10/21/2025, 2:47:49 AM

Last updated: 10/21/2025, 6:20:37 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats