Zyxel’s Vulnerability Resurfaces: A Comedy of Error Messages with a CVE-2023-28771 Plot Twist!
CVE-2023-28771 is back in action, making a cameo in another attack against critical infrastructure. It’s like the villain that just won’t quit! GreyNoise warns of a surge in exploit attempts, so patch those Zyxel devices, keep a close eye on your network, and maybe give port 500 a little extra love.

Hot Take:
It looks like the old Zyxel vulnerability is back in action, and it’s tearing through critical infrastructure like a toddler in a candy store. This is one bug that just refuses to be squashed, and now it’s up to the good folks in cybersecurity to play Whack-a-Mole with these persistent exploit attempts. Strap in for what looks to be another ride on the vulnerability carousel!
Key Points:
- Old Zyxel vulnerability CVE-2023-28771 re-emerges as a threat.
- Originally exploited in Denmark’s critical infrastructure in 2023.
- Recent surge in exploit attempts detected by GreyNoise, targeting multiple countries.
- Threat tied to a possible Mirai botnet variant, with spoofed IP origins.
- Organizations are advised to patch, filter, and monitor to mitigate risk.
Already a member? Log in here