[SA] Security Advisory - for DoS vulnerability of XGS2220, XMG1930, and XS1930 series switches

CVE: CVE-2023-28768

Summary

Zyxel has released patches for some switches affected by a denial-of-service (DoS) vulnerability. Users are advised to install them for optimal protection.

What is the vulnerability?

Improper frame handling in the Zyxel XGS2220, XMG1930, and XS1930 series switches could allow an unauthenticated LAN-based attacker to cause DoS conditions by sending crafted frames to an affected switch.

What versions are vulnerable—and what should you do?

After a thorough investigation, we’ve identified the vulnerable switches that are within their vulnerability support period and released patches to address the vulnerability, as shown in the table below.

Affected model Affected version Patch availability
XGS2220-30 V4.80(ABXN.1) V4.80(ABXN.2)
XGS2220-30F V4.80(ABYE.1) V4.80(ABYE.2)
XGS2220-30HP V4.80(ABXO.1) V4.80(ABXO.2)
XGS2220-54 V4.80(ABXP.1) V4.80(ABXP.2)
XGS2220-54FP V4.80(ACCE.1) V4.80(ACCE.2)
XGS2220-54HP V4.80(ABXQ.1) V4.80(ABXQ.2)
XMG1930-30 V4.80(ACAR.1) V4.80(ACAR.2)
XMG1930-30HP V4.80(ACAS.1) V4.80(ACAS.2)
XS1930-10 V4.80(ABQE.1) V4.80(ABQE.2)
XS1930-12F V4.80(ABZV.1) V4.80(ABZV.2)
XS1930-12HP V4.80(ABQF.1) V4.80(ABQF.2)

Got a question?

Please contact your local service rep or visit Zyxel’s Community for further information or assistance.

Revision history

2023-8-15: Initial release.

Articles in this section

Was this article helpful?
0 out of 0 found this helpful
Share