Zyxel Critical Vulnerability Let Attackers perform OS command injection


Zyxel has issued patches to address a critical operating system (OS) command injection vulnerability identified as CVE-2024-7261.

This vulnerability affects several versions of their access points (AP) and security routers. Users are strongly urged to apply these patches to safeguard their systems against exploits.

EHA

CVE-2024-7261 – The Vulnerability

The vulnerability arises from improper neutralizing of unique elements in the “host” parameter within the CGI program of specific AP and security router versions.

This flaw could enable an unauthenticated attacker to execute OS commands by sending a specially crafted cookie to a vulnerable device. Such an exploit could have severe implications, including unauthorized access and control over affected devices.

Zyxel has conducted a thorough investigation to identify the products affected by this vulnerability. Below is a detailed table listing the affected models, their vulnerable versions, and the corresponding patch availability.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Product Affected Model Affected Version Patch Availability
AP NWA50AX 7.00(ABYW.1) and earlier 7.00(ABYW.2)
NWA50AX PRO 7.00(ACGE.1) and earlier 7.00(ACGE.2)
NWA55AXE 7.00(ABZL.1) and earlier 7.00(ABZL.2)
NWA90AX 7.00(ACCV.1) and earlier 7.00(ACCV.2)
NWA90AX PRO 7.00(ACGF.1) and earlier 7.00(ACGF.2)
NWA110AX 7.00(ABTG.1) and earlier 7.00(ABTG.2)
NWA130BE 7.00(ACIL.1) and earlier 7.00(ACIL.2)
NWA210AX 7.00(ABTD.1) and earlier 7.00(ABTD.2)
NWA220AX-6E 7.00(ACCO.1) and earlier 7.00(ACCO.2)
NWA1123-AC PRO 6.28(ABHD.0) and earlier 6.28(ABHD.3)
NWA1123ACv3 6.70(ABVT.4) and earlier 6.70(ABVT.5)
WAC500 6.70(ABVS.4) and earlier 6.70(ABVS.5)
WAC500H 6.70(ABWA.4) and earlier 6.70(ABWA.5)
WAC6103D-I 6.28(AAXH.0) and earlier 6.28(AAXH.3)
WAC6502D-S 6.28(AASE.0) and earlier 6.28(AASE.3)
WAC6503D-S 6.28(AASF.0) and earlier 6.28(AASF.3)
WAC6552D-S 6.28(ABIO.0) and earlier 6.28(ABIO.3)
WAC6553D-E 6.28(AASG.2) and earlier 6.28(AASG.3)
WAX300H 7.00(ACHF.1) and earlier 7.00(ACHF.2)
WAX510D 7.00(ABTF.1) and earlier 7.00(ABTF.2)
WAX610D 7.00(ABTE.1) and earlier 7.00(ABTE.2)
WAX620D-6E 7.00(ACCN.1) and earlier 7.00(ACCN.2)
WAX630S 7.00(ABZD.1) and earlier 7.00(ABZD.2)
WAX640S-6E 7.00(ACCM.1) and earlier 7.00(ACCM.2)
WAX650S 7.00(ABRM.1) and earlier 7.00(ABRM.2)
WAX655E 7.00(ACDO.1) and earlier 7.00(ACDO.2)
WBE530 7.00(ACLE.1) and earlier 7.00(ACLE.2)
WBE660S 7.00(ACGG.1) and earlier 7.00(ACGG.2)
Security Router USG LITE 60AX V2.00(ACIP.2) V2.00(ACIP.3)*

Zyxel’s proactive response to this vulnerability highlights the importance of regular software updates and patch management in maintaining cybersecurity.

Users of the affected products are advised to apply the patches immediately to mitigate potential risks.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial



Source link