• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Zyxel Releases Patch for Critical Firewall OS Command Injection Vulnerability

You are here: Home / General Cyber Security News / Zyxel Releases Patch for Critical Firewall OS Command Injection Vulnerability
May 13, 2022

Firewall Vulnerability

Zyxel has moved to tackle a critical security vulnerability influencing Zyxel firewall units that permits unauthenticated and remote attackers to obtain arbitrary code execution.

“A command injection vulnerability in the CGI plan of some firewall variations could let an attacker to modify unique files and then execute some OS commands on a vulnerable machine,” the business mentioned in an advisory posted Thursday.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity organization Fast7, which discovered and reported the flaw on April 13, 2022, stated that the weak spot could allow a distant unauthenticated adversary to execute code as the “no person” user on impacted appliances.

Tracked as CVE-2022-30525 (CVSS rating: 9.8), the flaw impacts the following goods, with patches unveiled in version ZLD V5.30 –

  • USG FLEX 100(W), 200, 500, 700
  • USG FLEX 50(W) / USG20(W)-VPN
  • ATP collection, and
  • VPN series

Immediate 7 observed that there are at the very least 16,213 vulnerable Zyxel units uncovered to the internet, earning it a profitable attack vector for menace actors to phase possible exploitation makes an attempt.

The cybersecurity agency also pointed out that Zyxel silently issued fixes to tackle the issue on April 28, 2022 devoid of publishing an related Popular Vulnerabilities and Exposures (CVE) identifier or a security advisory. Zyxel, in its inform, blamed this on a “miscommunication during the disclosure coordination system.”

CyberSecurity

“Silent vulnerability patching tends to only assist energetic attackers, and leaves defenders in the dark about the genuine risk of recently discovered issues,” Speedy7 researcher Jake Baines claimed.

The advisory comes as Zyxel dealt with a few distinctive issues, together with a command injection (CVE-2022-26413), a buffer overflow (CVE-2022-26414), and a area privilege escalation (CVE-2022-0556) flaw, in its VMG3312-T20A wireless router and AP Configurator that could lead to arbitrary code execution.

Observed this posting fascinating? Comply with THN on Facebook, Twitter  and LinkedIn to read through a lot more special articles we article.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Costa Rica Declares National Emergency Following Conti Cyber-Attack

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zyxel Releases Patch for Critical Firewall OS Command Injection Vulnerability
  • Costa Rica Declares National Emergency Following Conti Cyber-Attack
  • Oklahoma City Indian Clinic Data Breach Affects 40,000 Individuals
  • Iranian Hackers Leveraging BitLocker and DiskCryptor in Ransomware Attacks
  • E.U. Proposes New Rules for Tech Companies to Combat Online Child Sexual Abuse
  • Malware Builder Leverages Discord Webhooks
  • You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius
  • Windows Server admins say latest Patch Tuesday broke authentication policies
  • Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks
  • Thousands of WordPress Sites Hacked to Redirect Visitors to Scam Sites

Copyright © TheCyberSecurity.News, All Rights Reserved.