Zyxel patches critical flaws in EOL NAS devices
Zyxel has released patches for three critical vulnerabilities (CVE-2024-29972, CVE-2024-29973, and CVE-2024-29974) affecting two network-attached storage (NAS) devices that have recently reached end-of-vulnerability-support.
About the vulnerabilities
The three vulnerabilities are:
- A command injection vulnerability in the CGI program that could allow an unauthenticated attacker to execute some OS commands by sending a crafted HTTP POST request (CVE-2024-29972)
- A command injection vulnerability in the “setCookie” parameter that could allow an unauthenticated attacker to execute some OS commands by sending a crafted HTTP POST request (CVE-2024-29973)
- A remote code execution vulnerability in the CGI program “file_upload-cgi” that could allow an unauthenticated attacker to execute arbitrary code by uploading a crafted configuration file to a vulnerable device (CVE-2024-29974)
The vulnerabilities have been discovered and reported by Timothy Hjort, a vulnerability researcher with Outpost24’s Ghost Labs.
Hjort also found a backdoor account used for remote support (that was supposedly removed four years ago) and two other flaws that can be exploited by attackers who have already achieved access to a vulnerable device to elevate their privileges:
- CVE-2024-29975 may allow an authenticated attacker with admin privileges to execute some system commands as “root”
- CVE-2024-29976 – an information disclosure flaw – may allow an authenticated attacker to obtain session tokens for all authenticated users, including administrators.
In his technical write-up about the vulnerabilites, he also included proof of concept exploit code.
Patches for some of the flaws are available
The vulnerabilities affect Zyxel NAS models NAS326, running v5.21(AAZF.16)C0 and earlier, and NAS542, running v5.21(ABAG.13)C0 and earlier.
“Zyxel has treated the disclosure process fairly, agreeing to a coordinated disclosure,” Hjort noted.
“Despite the fact that the device has reached End-of-Life by the end of last year, they still released patches for the three critical vulnerabilities CVE-2024-29972, CVE-2024-29973, and CVE-2024-29974. Furthermore, as the device has reached End-of-Life, they decided to remove the ‘Remote Support’ account ‘NsaRescueAngel’.”
Users of the EOL devices are advised to upgrade to v5.21(AAZF.17)C0 and v5.21(ABAG.14)C0, respectively.
Zyxel did not mention whether any of the flaws are being exploited, but with all this information now public, it’s likely just a matter of time until vulnerable devices get conscripted into a botnet or hit with ransomware.
source: HelpNetSecurity
Free security scan for your website
Top News:
Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia
December 27, 2024Clop ransomware is now extorting 66 Cleo data-theft victims
December 24, 2024Five lesser known Task Manager features in Windows 11
December 25, 2024DDoS Attacks Surge as Africa Expands Its Digital Footprint
December 26, 2024