• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability

You are here: Home / Cyber Security News / Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability

Impression supply: z3r00t

The U.S. Cybersecurity and Infrastructure Security Agency on Monday extra two security flaws, which includes the just lately disclosed remote code execution bug affecting Zyxel firewalls, to its Acknowledged Exploited Vulnerabilities Catalog, citing proof of energetic exploitation.

Tracked as CVE-2022-30525, the vulnerability is rated 9.8 for severity and relates to a command injection flaw in decide on variations of the Zyxel firewall that could permit an unauthenticated adversary to execute arbitrary instructions on the underlying working program.

Impacted equipment contain –

  • USG FLEX 100, 100W, 200, 500, 700
  • USG20-VPN, USG20W-VPN
  • ATP 100, 200, 500, 700, 800, and
  • VPN sequence

The issue, for which patches were being released by the Taiwanese organization in late April (ZLD V5.30), became public expertise on May well 12 subsequent a coordinated disclosure method with Immediate7.

Source: Shadowserver

Basically a day later on, the Shadowserver Foundation reported it began detecting exploitation attempts, with most of the vulnerable appliances positioned in France, Italy, the U.S., Switzerland, and Russia.

Also extra by CISA to the catalog is CVE-2022-22947, another code injection vulnerability in Spring Cloud Gateway that could be exploited to enable arbitrary distant execution on a distant host by indicates of a specially crafted request.

The vulnerability is rated 10 out of 10 on the CVSS vulnerability scoring system and has because been addressed in Spring Cloud Gateway versions 3.1.1 or afterwards and 3..7 or later as of March 2022.

Discovered this write-up intriguing? Adhere to THN on Facebook, Twitter  and LinkedIn to browse a lot more exceptional information we publish.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Apple rolls out iOS 15.5 with upgrades to Apple Cash and Podcasts
Next Post: Spotify is testing NFT galleries on artist pages »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © 2025 · AllTech.News, All Rights Reserved.