CVE-2023-27991

Vulnerability updated 5 months ago (2024-05-04T22:18:23.540Z)
Download STIX
Preview STIX
CVE-2023-27991 is a high-severity post-authentication command injection vulnerability that was identified in select versions of Zyxel firewall software. This flaw, which has a CVSS score of 8.8, represents a significant risk as it allows an authenticated attacker to remotely execute certain operating system commands. As a design and implementation flaw in the software, this vulnerability could potentially compromise system integrity and security if exploited by malicious entities. Zyxel, the company responsible for the affected software, acknowledged the issue and promptly addressed it through their security advisories. The advisory specifically pertains to the Cross-Site Scripting (XSS) vulnerability and the post-authentication command injection vulnerability found in their firewall systems. By releasing patches and updates, Zyxel mitigated the risks associated with CVE-2023-27991, thereby enhancing the security posture of their firewall systems. Despite the duplication of information, it's important to reiterate that the vulnerability in question, CVE-2023-27991, had a significant impact on certain versions of Zyxel's firewall software. However, swift action from the company ensured that the vulnerability was addressed and fixed promptly. Users of the affected software versions are strongly advised to apply the provided patches and updates to secure their systems against potential exploitation of this vulnerability.
Description last updated: 2024-05-04T21:28:03.861Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2023-27991 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more