Zyxel Addresses Critical Security Vulnerabilities in NAS Products
BugProveBugProve
Zyxel, a leading networking solutions provider, has recently published a security advisory addressing critical security vulnerabilities including authentication bypass and command injection vulnerabilities discovered in some of their personal cloud storage products (Specific models affected: NAS326 and NAS542).Â
Four out of the six critical security vulnerabilities were reported by Gabor Seljan of BugProve, utilizing BugProve’s firmware analysis platform. Detailed advisories were published here and here, with responsible disclosure and coordination between BugProve and Zyxel.Â
The identified critical security vulnerabilities are assigned the following CVE numbers:
Security Impact:
By chaining the authentication bypass vulnerability with post-auth blind OS command injection vulnerabilities, an unauthenticated, remote attacker could perform unauthorized actions in the context of the root user. Addressing these vulnerabilities is crucial as authentication bypass vulnerabilities may eventually be exploited, providing access to previously unavailable attack vectors.
Action Required:
Zyxel has promptly released patches to mitigate these vulnerabilities. Users are strongly advised to install these patches to ensure optimal protection of their NAS products.
For more detailed information and patch downloads, please refer to Zyxel’s official security advisory here.Â
Always make sure you keep your IoT devices updated! Vulnerabilities detected by malicious actors can be exploited anytime without the fixed firmware versions. Buy from a trusted vendor that keeps managing their products' security even years after market release.Â
New Podcast Episode
Related News