CVE: CVE-2023-5593
Zyxel security advisory for out-of-bounds write vulnerability in SecuExtender SSL VPN Client software.
Summary
Zyxel has released patches for the Windows-based SecuExtender SSL VPN Client software affected by an out-of-bounds write vulnerability. Users are advised to install them for optimal protection.
What is the vulnerability?
The out-of-bounds write vulnerability in the Windows-based SecuExtender SSL VPN Client software could allow a local authenticated user to gain a privilege escalation by sending a crafted CREATE message.
What versions are vulnerable—and what should you do?
After a thorough investigation, we have confirmed that only the Windows-based SecuExtender SSL VPN Client software is affected and have released a patch to address the issue, as shown in the table below.
Affected model | Affected version | Patch availability |
SecuExtender SSL VPN Client | V4.0.4.0 (for Windows) | V4.0.5.0 (for Windows) |
Got a question?
Please contact your local service rep or visit Zyxel’s Community for further information or assistance.
Acknowledgment
Thanks to Daniele Scanu and Fabio Carretto from Soter IT Security for reporting the issue to us.
Revision history
2023-11-21: Initial release.