Zyxel security advisory for XSS vulnerability of GS1900 series switches
CVE: CVE-2021-35030
Summary
Zyxel has released patches addressing a cross-site scripting (XSS) vulnerability in the GS1900 series of switches. Users are advised to install the applicable firmware updates for optimal protection.
What is the vulnerability?
A XSS vulnerability was identified in Zyxel’s GS1900 series of switches, such that an attack could be triggered when a user accesses certain GUI pages with the malicious LLDP packets processed by the switch. However, this can only occur if the attacker is directly connected to the switch, because the LLDP protocol only allows LLDP packets to be sent to and received from devices that are directly connected to each other; thus, the risk is relatively low.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable switches and released firmware patches to address the issue, as shown in the table below.
Affected model | Patch availability |
---|---|
GS1900-8 | |
GS1900-8HP | |
GS1900-10HP | |
GS1900-16 | |
GS1900-24E | |
GS1900-24EP | |
GS1900-24 | |
GS1900-24HP | |
GS1900-24HPv2 | |
GS1900-48 | |
GS1900-48HP | |
GS1900-48HPv2 |
For requesting a standard firmware, please contact Zyxel’s local support team.
Got a question?
Please contact your local service rep or visit Zyxel’s forum for further information or assistance.
Acknowledgment
Thanks to Jasper Lievisse Adriaanse for reporting the issue to us.
Revision history
2021-7-27: Initial release
2022-6-13: Update the patch availability in the table. Users are requested to contact Zyxel’s local support team for the standard firmware in the interim.
2022-9-1: Update the patch availability