Zyxel Devices Under Siege: The Mirai Botnet Takes a Swipe at CVE-2023-28771 Vulnerability!

Zyxel networking devices are under attack due to a vulnerability tracked as CVE-2023-28771. Despite previous warnings, hackers are exploiting this flaw, causing a spike in activity worldwide. If you own one of these devices, it’s time to patch up or risk joining the cyber circus!

Pro Dashboard

Hot Take:

Oh Zyxel, you’re at it again! Another day, another vulnerability. If only these devices had an “anti-exploit” setting like my toaster’s anti-burn feature. To all the Zyxel device owners: you might want to start unplugging your devices or at least keep a fire extinguisher handy for when things get hot—and not in a good way.

Key Points:

  • Zyxel devices have a new vulnerability, CVE-2023-28771, allowing remote code execution via UDP port 500.
  • June 16th saw a spike in exploitation attempts, with 244 internet addresses making their move.
  • Targets include India, Spain, Germany, the USA, and the UK, with potential linkage to the infamous Mirai botnet.
  • Attack sources are suspiciously linked to Verizon Business infrastructure but could be spoofed.
  • Immediate patching and blocking of identified IPs are advised to avoid becoming an unwilling participant in a botnet.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?