
A severe security vulnerability affecting certain Zyxel firewall and VPN devices is currently under active attack. This critical flaw, identified as CVE-2023-28771, is a remote code execution (RCE) vulnerability.
This means attackers can potentially gain unauthorized access and execute arbitrary code on vulnerable devices over the network, without requiring authentication. The exploit is being actively used in the wild, posing a significant and immediate threat to organizations relying on these specific Zyxel products.
Zyxel has released firmware updates to address this vulnerability. It is absolutely critical that users of affected devices immediately apply the latest security patches. Failure to update leaves devices exposed to potential compromise, which could lead to network breaches, data theft, or disruption of services.
Security experts are urging administrators to verify their device models and firmware versions and prioritize applying the necessary updates to mitigate the risk posed by this active RCE exploit. Patching now is the most effective defense against these ongoing attacks.
Source: https://securityaffairs.com/179073/hacking/attackers-target-zyxel-rce-vulnerability-cve-2023-28771.html