CVE-2023-27991 is a high-severity post-authentication command injection vulnerability that was identified in select versions of Zyxel firewall software. This flaw, which has a CVSS score of 8.8, represents a significant risk as it allows an authenticated attacker to remotely execute certain operating system commands. As a design and implementation flaw in the software, this vulnerability could potentially compromise system integrity and security if exploited by malicious entities.
Zyxel, the company responsible for the affected software, acknowledged the issue and promptly addressed it through their security advisories. The advisory specifically pertains to the Cross-Site Scripting (XSS) vulnerability and the post-authentication command injection vulnerability found in their firewall systems. By releasing patches and updates, Zyxel mitigated the risks associated with CVE-2023-27991, thereby enhancing the security posture of their firewall systems.
Despite the duplication of information, it's important to reiterate that the vulnerability in question, CVE-2023-27991, had a significant impact on certain versions of Zyxel's firewall software. However, swift action from the company ensured that the vulnerability was addressed and fixed promptly. Users of the affected software versions are strongly advised to apply the provided patches and updates to secure their systems against potential exploitation of this vulnerability.
Description last updated: 2024-05-04T21:28:03.861Z