Zyxel Addresses Critical Security Vulnerabilities in NAS Products

Zyxel, a leading networking solutions provider, has recently published a security advisory addressing critical security vulnerabilities including authentication bypass and command injection vulnerabilities discovered in some of their personal cloud storage products (Specific models affected: NAS326 and NAS542). 

Four out of the six critical security vulnerabilities were reported by Gabor Seljan of BugProve, utilizing BugProve’s firmware analysis platform. Detailed advisories were published here and here, with responsible disclosure and coordination between BugProve and Zyxel. 

The identified critical security vulnerabilities are assigned the following CVE numbers:

  • CVE-2023-37927: Improper neutralization of special elements in the CGI program allows an authenticated attacker to execute OS commands via a crafted URL.
  • CVE-2023-37928: A post-authentication command injection vulnerability in the WSGI server enables authenticated attackers to execute OS commands via a crafted URL.
  • CVE-2023-4473: Authentication bypass vulnerability allows attackers to circumvent the authentication mechanism of the webserver to gain unauthorized access and exploit other command injection vulnerabilities that would otherwise require authentication.
  • CVE-2023-4474: Improper neutralization of special elements in the WSGI server allows unauthenticated attackers to execute OS commands via a crafted URL.

Security Impact:

By chaining the authentication bypass vulnerability with post-auth blind OS command injection vulnerabilities, an unauthenticated, remote attacker could perform unauthorized actions in the context of the root user. Addressing these vulnerabilities is crucial as authentication bypass vulnerabilities may eventually be exploited, providing access to previously unavailable attack vectors.

Action Required:

Zyxel has promptly released patches to mitigate these vulnerabilities. Users are strongly advised to install these patches to ensure optimal protection of their NAS products.

For more detailed information and patch downloads, please refer to Zyxel’s official security advisory here. 

Always make sure you keep your IoT devices updated! Vulnerabilities detected by malicious actors can be exploited anytime without the fixed firmware versions. Buy from a trusted vendor that keeps managing their products’ security even years after market release. 

Published By
BugProve
BugProve

Automated firmware analysis platform to identify known and 0-day vulnerabilities and to support your compliance needs.



Automated firmware analysis platform to identify known and 0-day vulnerabilities and to support your compliance needs.



jQuery(()=>{const o=jQuery(‘#sidebar’)
const t=jQuery(window)
if(!o[0]){return}
function isScrolledIntoView(el){if(typeof jQuery===’function’&&el instanceof jQuery){el=el[0]}else if(typeof jQuery===’function’){el=jQuery(el)[0]}
if(!el){return!1}
const rect=el.getBoundingClientRect();return(rect.top>=0&&rect.left>=0&&rect.bottom<=(window.innerHeight||document.documentElement.clientHeight)&&rect.right<=(window.innerWidth||document.documentElement.clientWidth))}
t.scroll(()=>{jQuery(‘#sidebar’).css(‘left’,`${( t.width() – jQuery( ‘.td-pb-row’ ).width() ) / 2 – 60}px`)
if(isScrolledIntoView(‘.td-footer-wrapper’)||(jQuery(‘#sidebar’).offset().top+jQuery(‘#sidebar’).height()>jQuery(‘.td-sidebar-guide’).offset().top)){o.hide()}else{o.show()}});t.resize(()=>{jQuery(‘#sidebar’).css(‘left’,`${( t.width() – jQuery( ‘.td-pb-row’ ).width() ) / 2 – 60}px`)
if(isScrolledIntoView(‘.td-footer-wrapper’)||(jQuery(‘#sidebar’).offset().top+jQuery(‘#sidebar’).height()>jQuery(‘.td-sidebar-guide’).offset().top)){o.hide()}else{o.show()}});jQuery(document).ready(()=>{jQuery(‘#sidebar’).css(‘position’,’fixed’)
jQuery(‘#sidebar’).css(‘left’,`${( t.width() – jQuery( ‘.td-pb-row’ ).width() ) / 2 – 60}px`)
if(isScrolledIntoView(‘.td-footer-wrapper’)||(jQuery(‘#sidebar’).offset().top+jQuery(‘#sidebar’).height()>jQuery(‘.td-sidebar-guide’).offset().top)){o.hide()}else{o.show()}})})

Source link

Technology

adobe generative ai 1

Grace Yee, Senior Director of Ethical Innovation AI Ethics and Accessibility at Adobe Interview Series Adobe’s Claims Next Generative AI Features Will Be Commercially Safe Speaking of “early access” features, Adobe introduced AI-powered Lens Blur as an early access tool last year. With today’s Lightroom ecosystem update, it is finally available to everyone, no strings […]

Read More
Technology

Wejdź w VOX casino online, serce ekscytującego i bezpiecznego doświadczenia w obstawianiu!

Czy kiedykolwiek wyobrażałeś sobie, że wpadłeś na ekscytujący i rewolucyjny sposób na cieszenie się atmosferą bukmacherską, która przynosi wibrację i napięcie renomowanego paska Vegas bezpośrednio do twoich dłoni, niech to tylko relaksujesz się w rezydencji i wyjściu i wyjściu o? Następnie jesteś we właściwej pozycji! VOX kasyno zrewolucjonizował sposób, w jaki entuzjaści gier biorą udział […]

Read More
Technology

Fontan – Twój wiodący cel kasyna i doskonałości bukmacherskiej

Fontan służy jako znana platforma w branży hazardowej internetowej, zapewniając niezrównane wrażenia dla entuzjastów kasyn i zawodników sportowych. Jako ustalona nazwa w świecie rozrywki, FontanKasyno zapewnia szeroki wybór gier kasynowych, takich jak automaty, gry stołowe, wybór dealerów na żywo i nie tylko, obsługując zainteresowania każdego gracza. Ponadto platforma oferuje szeroką sekcję bukmacherską, w tym popularne […]

Read More