Zyxel has recently issued a critical security advisory regarding a significant vulnerability affecting multiple models of its business routers and access points. The flaw, tracked as CVE-2024-7261, has been assigned a CVSS v3 score of 9.8, indicating its severity. This OS command injection vulnerability stems from improper handling of user-supplied data in the CGI program of several Zyxel devices. Exploiting this flaw could allow unauthenticated attackers to execute arbitrary commands on the affected devices’ operating systems, posing a substantial risk to network security.
The impacted models include a wide range of devices from Zyxel’s NWA, WAC, WAX, and WBE series. For instance, NWA Series models up to version 7.00, WAC Series models up to version 6.28, and WAX Series models up to version 7.00 are all vulnerable. Additionally, the USG LITE 60AX security router is affected, but it is automatically updated by Zyxel’s cloud service to mitigate this issue. Users of these devices are strongly urged to upgrade to the latest firmware versions to protect against potential exploitation of this critical vulnerability.
Beyond the CVE-2024-7261 flaw, Zyxel has also addressed several other high-severity vulnerabilities in its APT and USG FLEX firewalls. These include buffer overflow and command injection issues that could lead to denial of service (DoS) attacks or unauthorized command execution. Notably, CVE-2024-42057, which affects the IPSec VPN feature, allows remote attackers to exploit the flaw without authentication. However, successful exploitation requires specific configuration, such as a User-Based-PSK authentication mode and a username longer than 28 characters.
The release of these security updates by Zyxel highlights the critical need for users to maintain their devices with the latest firmware to defend against potential threats. Zyxel’s proactive approach in addressing these vulnerabilities is crucial in mitigating risks and ensuring network security. Users are advised to review Zyxel’s security advisories, implement the necessary updates, and follow best practices for securing their network infrastructure. This vigilance is essential to protect against emerging threats and maintain the integrity of their network systems.
Reference: