Zyxel has produced a patch to handle a critical vulnerability in its firmware regarding a hardcoded undocumented top secret account that could be abused by an attacker to login with administrative privileges and compromise its networking gadgets.
The flaw, tracked as CVE-2020-29583 (CVSS rating 7.8), affects version 4.60 existing in vast-selection of Zyxel products, which includes Unified Security Gateway (USG), USG FLEX, ATP, and VPN firewall solutions.
EYE researcher Niels Teusink claimed the vulnerability to Zyxel on November 29, adhering to which the enterprise unveiled a firmware patch (ZLD V4.60 Patch1) on December 18.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
In accordance to the advisory revealed by Zyxel, the undocumented account (“zyfwp”) arrives with an unchangeable password (“PrOw!aN_fXp”) that’s not only stored in plaintext but could also be used by a malicious 3rd-party to login to the SSH server or web interface with admin privileges.
Zyxel mentioned the hardcoded credentials ended up put in position to provide automated firmware updates to connected entry factors by FTP.
Noting that close to 10% of 1000 equipment in the Netherlands run the afflicted firmware version, Teusink mentioned the flaw’s relative ease of exploitation helps make it a critical vulnerability.
“As the ‘zyfwp’ person has admin privileges, this is a critical vulnerability,” Teusink claimed in a publish-up. “An attacker could wholly compromise the confidentiality, integrity and availability of the machine.”
“A person could for instance adjust firewall settings to make it possible for or block sure website traffic. They could also intercept site visitors or generate VPN accounts to acquire entry to the network powering the device. Merged with a vulnerability like Zerologon this could be devastating to little and medium businesses.”
The Taiwanese organization is also anticipated to address the issue in its obtain level (AP) controllers with a V6.10 Patch1 which is established to be unveiled in April 2021.
It really is hugely recommended that buyers put in the necessary firmware updates to mitigate the risk involved with the flaw.
Found this write-up intriguing? Comply with THN on Facebook, Twitter and LinkedIn to examine far more distinctive material we article.
Some elements of this write-up are sourced from:
thehackernews.com