The out-of-bounds write vulnerability in the Windows-based SecuExtender SSL VPN Client software version 4.0.4.0 could allow an authenticated local user to gain a privilege escalation by sending a crafted CREATE message.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 08:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-out-of-bounds-write-vulnerability-in-secuextender-ssl-vpn-client-software - Patch, Vendor Advisory | 
30 Nov 2023, 15:14
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Zyxel secuextender Ssl Vpn
         Zyxel  | 
|
| References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-out-of-bounds-write-vulnerability-in-secuextender-ssl-vpn-client-software - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:zyxel:secuextender_ssl_vpn:4.0.4.0:*:*:*:*:windows:*:* | 
20 Nov 2023, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-11-20 12:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5593
Mitre link : CVE-2023-5593
CVE.ORG link : CVE-2023-5593
JSON object : View
Products Affected
                zyxel
- secuextender_ssl_vpn
 
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
