• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Over 20,000 Zyxel Firewalls Still Exposed to Critical Bug

You are here: Home / Cyber Security News / Over 20,000 Zyxel Firewalls Still Exposed to Critical Bug

Buyers of a common firewall producer are being urged to patch a critical vulnerability preset by the seller again in April, just after scientists warned of in-the-wild exploits.

Zyxel up to date its ATP sequence, VPN sequence, and USG FLEX collection of products and solutions on April 28 just after Fast7 discovered and responsibly disclosed CVE-2022-30525.

The bug “allows an unauthenticated and remote attacker to accomplish arbitrary code execution as the no person consumer on the impacted product,” according to a lead security researcher at the firm, Jack Baines.

“The affected versions are susceptible to unauthenticated and remote command injection through the administrative HTTP interface. Instructions are executed as the nobody consumer,” he continued.

“This vulnerability is exploited as a result of the /ztp/cgi-bin/handler URI and is the consequence of passing unsanitized attacker enter into the os.program technique in lib_wan_settings.py. The vulnerable performance is invoked in affiliation with the setWanPortSt command. An attacker can inject arbitrary instructions into the mtu or the info parameter.”

Above the weekend, non-earnings security firm the Shadowserver Basis tweeted that it began seeing exploitation attempts on Friday.

We see at the very least 20 800 of the possibly afflicted Zyxel firewall models (by exceptional IP) available on the Internet. Most well-known are USG20-VPN (10K IPs) and USG20W-VPN (5.7K IPs). Most of the CVE-2022-30525 influenced products are in the EU – France (4.5K) and Italy (4.4K). pic.twitter.com/Wh7I8JCvVv

— Shadowserver (@Shadowserver) Could 15, 2022

“We see at least 20,800 of the most likely afflicted Zyxel firewall designs (by one of a kind IP) obtainable on the internet. Most popular are USG20-VPN (10K IPs) and USG20W-VPN (5.7K IPs),” it stated. “Most of the CVE-2022-30525 afflicted products are in the EU – France (4.5K) and Italy (4.4K).”

In accordance to Shadowserver, the future most widespread areas for exposed Zyxel firewalls are the US (2400), adopted by Switzerland (1700) and Russia (854).

Even so, irrespective of Immediate7’s dependable disclosure of the vulnerability, there seems to have been a communication breakdown with the Taiwanese firewall producer immediately after that.

In truth, Zyxel released a patch in late April without coordinating with the researchers, publishing an advisory or reserving a CVE. Quick7 thinks this may well have unwittingly aided threat actors.

“This patch launch is tantamount to releasing particulars of the vulnerabilities, since attackers and scientists can trivially reverse the patch to understand precise exploitation specifics, while defenders hardly ever trouble to do this,” argued Baines.

“Therefore, we’re releasing this disclosure early in purchase to guide defenders in detecting exploitation and to assistance them determine when to apply this resolve in their personal environments, in accordance to their individual risk tolerances. In other words, silent vulnerability patching tends to only assistance active attackers, and leaves defenders in the dark about the correct risk of freshly discovered issues.”



Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Apple's MacBook Air M1 falls back to $850
Next Post: Amazon's Fire TV sale cuts its streaming devices by up to 42 percent »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
  • Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors
  • Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
  • State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
  • Securing Agentic AI: How to Protect the Invisible Identity Access

Copyright © 2025 · AllTech.News, All Rights Reserved.