CVE-2023-28771

Known Exploited Vulnerability Entry External Catalog

Entry Details

CVE-2023-28771

Confirmed

Yes

2023-05-31 00:00 UTC


Timestamps

2023-05-31

2023-05-31


Scope

KEV entry: Zyxel Multiple Firewalls OS Command Injection Vulnerability | Affected: Zyxel / Multiple Firewalls | Description: Zyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls allow for improper error message handling which could allow an unauthenticated attacker to execute OS commands remotely by sending crafted packets to an affected device. | Required action: Apply updates per vendor instructions. | Due date: 2023-06-21 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-28771


References
  • {'id': 'CVE-2023-28771', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-28771'}

aa637b60-4c92-4960-9d26-4148ff2a4a3e

405284c2-e461-4670-8979-7fd2c9755a60

2026-02-02 13:24 UTC

2026-02-06 07:53 UTC

Evidence (1)
Type Source Signal Confidence Details GCVE Metadata
vendor_report cisa-kev successful_exploitation 0.80
View details
{
  "cwes": [
    "CWE-78"
  ],
  "date_added": "2023-05-31",
  "due_date": "2023-06-21",
  "feed": "CISA Known Exploited Vulnerabilities Catalog",
  "knownRansomwareCampaignUse": "Unknown",
  "product": "Multiple Firewalls",
  "vendorProject": "Zyxel",
  "vulnerabilityName": "Zyxel Multiple Firewalls OS Command Injection Vulnerability"
}
-