CVE: CVE-2023-35140
Summary
Zyxel has released patches for GS1900 series switches affected by an improper privilege management vulnerability. Users are advised to install them for optimal protection.
What is the vulnerability?
A vulnerability in the Zyxel GS1900 series switches could allow a local authenticated user with the read-only access to modify system settings on a vulnerable device.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable switches that are within their vulnerability support period and released patches to address the vulnerability, as shown in the table below.
Affected model | Affected version | Patch availability |
GS1900-8 | V2.70(AAHH.5) | V2.80(AAHH.0) |
GS1900-8HP | V2.70(AAHI.5) | V2.80(AAHI.0) |
GS1900-10HP | V2.70(AAZI.5) | V2.80(AAZI.0) |
GS1900-16 | V2.70(AAHJ.5) | V2.80(AAHJ.0) |
GS1900-24 | V2.70(AAHL.5) | V2.80(AAHL.0) |
GS1900-24E | V2.70(AAHK.5) | V2.80(AAHK.0) |
GS1900-24EP | V2.70(ABTO.5) | V2.80(ABTO.0) |
GS1900-24HPv2 | V2.70(ABTP.5) | V2.80(ABTP.0) |
GS1900-48 | V2.70(AAHN.5) | V2.80(AAHN.0) |
GS1900-48HPv2 | V2.70(ABTQ.5) | V2.80(ABTQ.0) |
Got a question?
Please contact your local service rep or visit Zyxel’s Community for further information or assistance.
Acknowledgment
Thanks to Alexey Morozkov for reporting the issue to us.
Revision history
2023-11-7: Initial release.