Zyxel Issues Critical Security Patches for NAS Devices

Zyxel Issues Critical Security Patches for NAS Devices

By
Nikita Ivanov
2 min read

Zyxel Issues Critical Security Patches for High-Severitу NAS Vulnerabilities

Zyxel has released critical security patches addressing three high-severity vulnerabilities impacting its NAS326 and NAS542 devices. These vulnerabilities, rated at 9.8 out of 10 for severity, consist of a backdoor account, a Python code injection flaw, and a remote code execution vulnerability. Despite reaching their end-of-life status in December 2023, Zyxel has rolled out patches for customers with extended warranties. Security researcher Timothy Hjort of Outpost24 unearthed these vulnerabilities and demonstrated their exploitation in a proof of concept. Although there have been no reported exploitations of these vulnerabilities in the wild, the existence of an exploitable method has raised significant concerns.

Key Takeaways

  • Zyxel has patched three high-severity flaws in NAS devices, identified as CVE-2024-29972, CVE-2024-29973, and CVE-2024-29974.
  • The vulnerabilities included a backdoor account, Python code injection, and remote code execution, all rated 9.8/10 in severity.
  • Despite reaching their end-of-life in 2023, Zyxel provided patches for devices with extended warranties.
  • Additionally, two moderate vulnerabilities, CVE-2024-29975 and CVE-2024-29976, were addressed, involving privilege escalation.
  • Security researcher Timothy Hjort discovered the flaws and provided a proof of concept for exploitation.

Analysis

Zyxel's proactive approach in patching high-severity vulnerabilities in its NAS devices, despite their end-of-life status, emphasizes the critical nature of cybersecurity, even for legacy products. The identified vulnerabilities, particularly the backdoor account and remote code execution, pose substantial risks to users with extended warranties, potentially leading to data breaches and system compromises. While the initiative by Zyxel to secure these devices is commendable, it underscores the ongoing challenges in maintaining security for outdated hardware. The discovery by Timothy Hjort and the demonstration of exploitability raise industry-wide concerns about the security of similar devices and the necessity for continuous monitoring and updates, even post-EOL.

Did You Know?

  • Backdoor Account: This refers to a concealed account within a system enabling unauthorized access to its resources. In the context of cybersecurity, it is often deliberately inserted by malicious actors or unintentionally left by developers, providing a covert entry point that circumvents normal authentication methods.
  • Python Code Injection: This type of security vulnerability allows attackers to inject and execute arbitrary Python code within a system. This can lead to unauthorized access, data theft, or manipulation of system functions. It typically occurs when user input is not adequately sanitized and is executed as part of the application's code.
  • Remote Code Execution (RCE): This represents a security vulnerability that enables an attacker to execute arbitrary commands or code on a victim's machine over the network without their permission. This can result in complete control over the affected system, enabling malicious activities such as data theft, system modification, or the installation of harmful software.

You May Also Like

This article is submitted by our user under the News Submission Rules and Guidelines. The cover photo is computer generated art for illustrative purposes only; not indicative of factual content. If you believe this article infringes upon copyright rights, please do not hesitate to report it by sending an email to us. Your vigilance and cooperation are invaluable in helping us maintain a respectful and legally compliant community.

Subscribe to our Newsletter

Get the latest in enterprise business and tech with exclusive peeks at our new offerings