Zyxel has issued critical hotfixes for a severe command injection vulnerability identified as CVE-2024-6342, affecting its NAS326 and NAS542 network-attached storage (NAS) devices. This vulnerability, reported by security researchers Nanyu Zhong and Jinwei Dong from VARAS@IIE, poses significant risks as it allows unauthenticated attackers to execute arbitrary operating system commands through a specially crafted HTTP POST request to the export-cgi program. The flaw is particularly concerning given the widespread use of Zyxel NAS devices by small to medium-sized businesses (SMBs) for crucial data storage and backup functions.
The vulnerability’s severity is underscored by Zyxel’s decision to provide hotfixes despite these NAS models having reached their end-of-vulnerability-support phase. This proactive measure aims to mitigate potential exploitation risks, emphasizing the critical nature of the flaw. Zyxel’s action reflects the company’s commitment to supporting customers even with outdated products, highlighting the importance of ongoing security vigilance for all devices, regardless of their support status.
Although Zyxel has not reported any active exploitation of the vulnerability, the company strongly urges users to apply the available hotfixes immediately. The security landscape for NAS devices remains perilous, as demonstrated by recent incidents where similar vulnerabilities, such as CVE-2024-29973, were exploited by botnets resembling Mirai. These events underscore the attractiveness of NAS devices as targets for cybercriminals and the need for prompt remediation to prevent potential breaches.
In light of these developments, Zyxel’s response serves as a crucial reminder for all users of older technology to remain vigilant about security updates. The ongoing threat landscape, particularly for devices that handle sensitive data, necessitates a proactive approach to applying security patches and protecting against emerging threats. Users of Zyxel NAS326 and NAS542 devices should implement the hotfixes without delay to safeguard their systems against potential attacks.
Reference: