CVE: CVE-2023-28768
Summary
Zyxel has released patches for some switches affected by a denial-of-service (DoS) vulnerability. Users are advised to install them for optimal protection.
What is the vulnerability?
Improper frame handling in the Zyxel XGS2220, XMG1930, and XS1930 series switches could allow an unauthenticated LAN-based attacker to cause DoS conditions by sending crafted frames to an affected switch.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable switches that are within their vulnerability support period and released patches to address the vulnerability, as shown in the table below.
Affected model | Affected version | Patch availability |
XGS2220-30 | V4.80(ABXN.1) | V4.80(ABXN.2) |
XGS2220-30F | V4.80(ABYE.1) | V4.80(ABYE.2) |
XGS2220-30HP | V4.80(ABXO.1) | V4.80(ABXO.2) |
XGS2220-54 | V4.80(ABXP.1) | V4.80(ABXP.2) |
XGS2220-54FP | V4.80(ACCE.1) | V4.80(ACCE.2) |
XGS2220-54HP | V4.80(ABXQ.1) | V4.80(ABXQ.2) |
XMG1930-30 | V4.80(ACAR.1) | V4.80(ACAR.2) |
XMG1930-30HP | V4.80(ACAS.1) | V4.80(ACAS.2) |
XS1930-10 | V4.80(ABQE.1) | V4.80(ABQE.2) |
XS1930-12F | V4.80(ABZV.1) | V4.80(ABZV.2) |
XS1930-12HP | V4.80(ABQF.1) | V4.80(ABQF.2) |
Got a question?
Please contact your local service rep or visit Zyxel’s Community for further information or assistance.
Revision history
2023-8-15: Initial release.