Zyxel security advisory for out-of-bounds write vulnerability in SecuExtender SSL VPN Client software

CVE: CVE-2023-5593
Summary

Zyxel has released patches for the Windows-based SecuExtender SSL VPN Client software affected by an out-of-bounds write vulnerability. Users are advised to install them for optimal protection.

What is the vulnerability?

The out-of-bounds write vulnerability in the Windows-based SecuExtender SSL VPN Client software could allow a local authenticated user to gain a privilege escalation by sending a crafted CREATE message.

What versions are vulnerable—and what should you do?

After a thorough investigation, we have confirmed that only the Windows-based SecuExtender SSL VPN Client software is affected and have released a patch to address the issue, as shown in the table below.


Affected model Affected version Patch availability
SecuExtender SSL VPN Client V4.0.4.0 (for Windows) V4.0.5.0 (for Windows)
Got a question?

Please contact your local service rep or visit Zyxel’s Community for further information or assistance.

Acknowledgment

Thanks to Daniele Scanu and Fabio Carretto from Soter IT Security for reporting the issue to us.

Revision history

2023-11-21: Initial release.