Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Zyxel Firewall Vulnerability Again in Attacker Crosshairs

Posted on June 17, 2025June 17, 2025 By CWS

A Zyxel vulnerability that was exploited in a coordinated assault towards Denmark’s essential infrastructure two years in the past is as soon as once more in attackers’ crosshairs, menace intelligence firm GreyNoise warns.

The safety defect, tracked as CVE-2023-28771 (CVSS rating of 9.8), is an improper error message dealing with challenge that may be exploited to execute OS instructions remotely.

Assaults concentrating on the flaw first emerged in Could 2023, one month after Zyxel rolled out patches for it, and intensified a month later.

A November 2023 report from non-profit cybersecurity middle for essential sectors SektorCERT revealed that 11 Danish vitality organizations have been compromised in Could 2023 by way of the exploitation of CVE-2023-28771.

The widespread marketing campaign towards the nation’s essential infrastructure continued all through Could 2023 with the exploitation of different safety defects, ultimately ensuing within the compromise of twenty-two organizations.

Now, GreyNoise warns of a spike in exploit makes an attempt towards CVE-2023-28771, all coming from IP addresses that haven’t been noticed participating in different scanning or exploitation actions within the two weeks prior.

“Exploitation makes an attempt towards CVE-2023-28771 have been minimal all through latest weeks. On June 16, GreyNoise noticed a concentrated burst of exploit makes an attempt inside a short while window, with 244 distinctive IPs noticed making an attempt exploitation,” the menace intelligence agency says.

The assaults have been primarily aimed toward targets within the US, the UK, Spain, Germany, and India. The origin IPs, registered to Verizon Enterprise infrastructure, have been from the US, however GreyNoise notes that the true supply of the assaults may have been spoofed, because the noticed visitors was UDP, on port 500.Commercial. Scroll to proceed studying.

The menace intelligence agency suspects that the exploitation makes an attempt are related to a Mirai botnet variant.

Organizations ought to ensure that their Zyxel units are patched towards CVE-2023-28771 and different recognized vulnerabilities, ought to apply community filtering to cut back the pointless port 500 publicity, and will monitor units for anomalous habits.

Associated: Mirai Botnets Exploiting Wazuh Safety Platform Vulnerability

Associated: Russian Hackers Doubtless Not Concerned in Assaults on Denmark’s Important Infrastructure

Associated: US Declares Botnet Takedown, Expenses Towards Russian Directors

Associated: Europol Targets Prospects of Smokeloader Pay-Per-Set up Botnet

Security Week News Tags:Attacker, Crosshairs, Firewall, Vulnerability, Zyxel

Post navigation

Previous Post: Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
Next Post: Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware

Related Posts

HeroDevs Raises $125 Million to Secure Deprecated OSS Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact Security Week News
Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Security Week News
Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect Security Week News
Critical Vulnerabilities Patched in Sophos Firewall Security Week News
WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software
  • HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution
  • CISA Adds ASUS Embedded Malicious Code Vulnerability to KEV List Following Active Exploitation
  • HPE OneView Software Vulnerability Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software
  • HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution
  • CISA Adds ASUS Embedded Malicious Code Vulnerability to KEV List Following Active Exploitation
  • HPE OneView Software Vulnerability Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark